Chinaunix首页 | 论坛 | 博客
  • 博客访问: 1284476
  • 博文数量: 3010
  • 博客积分: 10011
  • 博客等级: 上将
  • 技术积分: 30431
  • 用 户 组: 普通用户
  • 注册时间: 2008-05-27 11:53
文章分类

全部博文(3010)

文章存档

2008年(3010)

我的朋友

分类: LINUX

2008-05-27 14:59:00

The frequent headlines involvingincidents of stolen or hacked user records from company and government institutions, like the recent Veteran Affairs episode, have brought prob-ably unwanted attention the constant problem of securing vital, essential, and conidential personal, business, and national records from the hands of hackers and thieves. However,to many in the security community, such news has refocused the attention of the nation, if not the whole world, and re-ignited the debate about how far we need to go and what we need to do in order to secure the information infrastructure upon which all vital information

happens to reside and is transported.

Two fundamental developments have brought us to where we are today. First Internet tech-nology has become an integral part of our daily lives, and as it has, comprehensive security for systems upon which we have come to depend has become essential. The tremendous increase in connectivity, now driven more by new Wi-Fi technologies than ixed networks, has led to an increase in remote access and consequently increased system vulnerability.

These forces have, together with the plummeting prices of information processing and indexing devices and the development of sprawling global networks, made the generation, collection, processing, indexing, and storage of and access to information easy. Second, as the popularity of computer use has grown, our dependence on computers and computer technology has sky rocketed to new heights and is hovering toward total dependence. There are serious onsequences to total dependence on the information infrastructure and its as-

sociated technologies. As we have all witnessed in the last several years, Internet technolo-gies have been like a large cruise ship in the middle of the ocean with all its enmities but without a captain. The 21st century has, thus far, the most machine-dependent generation.

This dependence, though for convenience, is turning out to be one of the main sources of our security problems and a potential privacy concern. It is leading to the loss of our privacy, security, and autonomy.

These two developments, taken together, have created an even more tempting environment for online digital crimes than ever before. The annual Computer Crime Survey by the Com-puter Security Institute/Federal Bureau of Investigations (CSI/FBI) typically is a barometer of computer crime within the United States and every year presents alarming statistics about rising digital crime rates over our public networks. The survey results always paint a picture

of cyber crimes bleeding the nation. The CSI/FBI Computer Crime and Security surveys are always targeted to computer security practitioners in U.S. corporations, government agencies, inancial institutions, medical institutions, and universities. Recent data from these surveys show some disturbing developments, including:

阅读(81) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~