7 Belge Section 1

1.1. The New Insecurity

Since the terrorist attacks on September 11, 2001, computer security has taken on some new meanings. The first is positive. As part of a global tightening of belts and rolling up of sleeves, there emerged several outreaches designed to provide security training and certification to folks in all walks of life, from the consumer being…

1.1.1.1. Information Sharing and Analysis Centers

Akin to CERTs, Information Sharing and Analysis Centers (ISACs) help develop and promulgate "best practices" for protecting critical infrastructures and minimizing vulnerabilities. Many industries have established ISACs to allow these critical sectors to share information and work together to help better protect the economy. In the United States, Presidential Directive Number 63 and the Patriot…

1.1.2.1. Computer Crime

Computer crime has also become a major threat to business. According to the Federal Bureau of Investigation, computer crime is the most expensive form of commercial crime. In 2003, theft of information cost over $70 million, with an average cost of $2.6 million per theft. Also in 2003, denial of service attacks, which deprived companies…

1.1.2. The Sorry Trail

The story of network attacks, bugs, viruses, and criminal actions stretches as far as the computer industry itself. One of the first bugs to develop in a computer system was precisely that: a moth was found squished inside some relay contacts at a government installation. Lieutenant Grace Hopper collected that moth and duly pasted it…

1.1.1.3. No computer Is An Island

While once it was easy to ignore most warnings and scares as mere nuisances because most sites were isolated and unconnected, in today’s world, few computers stand alone. Viruses occur and spread with amazing speed, sometimes spanning the globe in hours or days (usually by stealing information, such as an email address book from one…

1.1.1.2. Vulnerable broadband

Just as corporate and government users are bonding together to provide mutual protection, however, a huge emerging class of users is expanding rapidly, and for the most part they are unprotected. As broadband Internet access becomes increasingly popular, more users set up home computers and leave them running 24/7. The result is they become targets…

1.1.1. Who You Gonna Call?

A new generation of security consultants what Business Week once termed "hackerbusters" have hung out their shingles. A number of organizations stand ready to provide expert assistance in case a computer virus outbreak threatens the Internet: Funded by the Defense Advanced Research Projects Agency (DARPA), the Computer Emergency Response Team (CERT) at the Software Engineering…