Online terrorism, computer crimes and cyber attacks are no longer abstract possibilities. They are real major threats requiring real, major safeguards.
The awareness of security has since September 11 events increased in many ways - increased concerned over physical sites, increased concerns of securing networked infrastructure and changes in corporate attitude from being confident about their organization’s security and delaying spending on security, to seeing IT security as an essential capital investment.
Surveys indicate an increase in external, as well as internal, attacks on information systems. The question is not if an organization’s system and business critical assets will be compromised, but when. We have already seemed numerous examples of viruses and worms.
Systems, data and personal information will come under attack. Every day, companies like EDS are discovering seven to ten vulnerabilities in systems around the world.
Tomorrow it will be web defacements, semantic attacks, domain name server (DNS) attacks, distributed denial service (DDoS) attacks, routing systems and infrastructure attacks. These are hidden weak spots attackers and cyber criminals use to get our information assents. What was secure yesterday simply does not hold up today.
In addition to direct financial loss, the loss of reputation and trust cause real long term damage.
Companies have been facing real network related challenges in the regular course of business. Now, we add terrorist attacks to that list and government and private business have begin to think about vulnerability of the computer systems and networks that support critical infrastructures.
Society’ vital services and critical infrastructure: communications, finance, transportation, and utilities such as electricity, oil, gas and water rely on computer and computer networked.
If these networked are damaged the nation will be disrupt. Governments as well as business that own and operate banks, utility infrastructure, transportation systems, telecommunications networks and other critical systems, must be prepared for the possibility of a destructive attack in cyberspace.
The cyber threat is out there, either directly or as collateral damage in other kinds of attacks.
Cyber terrorism
Enron: Rise, Scandal, and the Legacy of Corporate Greed
-
Enron Corporation, once a giant in the energy industry, rose to prominence
through innovative strategies and rapid expansion, only to collapse under
the we...