|
|
The world at large is colliding
on a worldwide networka network that allows us to communicate
with our customers and allies but one we also must share with
our competitors and adversaries. This global interconnectedness
provides fertile ground for individuals wishing to exploit the
vulnerabilities that surface in the rush to market and use new
technologies.
Such exploits have risen sharply in the past several years.
In 1999, fewer than 10,000 security incidents were reported
to the CERT Coordination Center, a federally funded security
tracking and advisory group. That number ballooned to more than
21,000 incidents in 2000 and nearly 53,000 in 2001.
There is little doubt that this trend will increase. In the
future, we anticipate: |
|
Emergence of new disruptive
technologies that will totally redefine the
security issues faced by commercial and government
organizations and, as a result, redefine the
international marketplace |
|
Marked increases in information
system-based espionage and warfare used to
gain advantage in business and threaten targeted
organizations economic infrastructures |
|
Rise and empowerment of transnational
groups (including hacker organizations, terrorist
groups, and criminal organizations) with sophisticated
information collection, exploitation, and
disruption capabilities |
|
|
|
Increasing difficulty identifying
the origin of Internet attacks and the location
of hostile users
or nodes |
|
Emergence of a global
economy more dependent upon and vulnerable
to attacks on
information systems, infrastructure, and fossil
fuels |
|
|
Organizations must recognize that, unless
they move to secure their presence on the global network
and protect their critical resources, they are shouldering
substantial risk.
It is also necessary to recognize that there are inherent
limits to the protection that security technologies and
protocols can provide. Even the best security measures
cant prevent every attack. But organizations can
dramatically reduce their vulnerability to threats and
contain the damage resulting from successful attacks by
implementing a high-quality
security program.
Over the next several years, as the frequency and severity
of security events continue to climb, a high-quality security
program will become basic business equipment, much like
voicemail and email are now. More and more organizations
will acknowledge the essential nature of security and
the vital contribution it makes to their bottom line.
Organizations that are slow to evolve to this new standard
will suffer the consequences, both in terms of attack-related
losses, and in customers and business partners lost to
less vulnerable competitors.
|
|
|
|