Concerns About What Will Happen Next: Should These Things Keep You Awake at Night?

Concerns About What Will Happen Next: Should These Things Keep You Awake at Night?

DOI: 10.4018/978-1-61520-831-9.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter discusses vulnerabilities that should be considered by decision makers as they could be seen as the soft underbelly of a society that has an irreversible and deep reliance on information technologies.
Chapter Preview
Top

1. Likely Future Security Challenges And The Potential For Cyberterrorism

I never think of the future, it comes soon enough (Attributed to Albert Einstein)

Prediction is very difficult, particularly about the future (Stated by Niels Bohr – original source uncertain (Mark Twain?))

The poet Alexander Pope wrote “Hope springs eternal in the human breast”. Whilst hope is good, it seems prudent to consider possible scenarios, anticipate trends and keep reviewing them as new information becomes available.

There are many sources of information on terrorism, security and related technologies. In addition, life imitates fiction as there are many works of fiction (and science-fiction) that seem to have given ideas for terrorist attacks or attempts, such as Tom Clancy’s Debt of Honor (1995) in which an airliner crashes into the US Congress, Mark Burnell’s The Rhythm Section (2000) describing a plot to mix liquids and cause simultaneous explosions in several planes during flight and Michael Dobbs The Edge of Madness (2009) in which the UK is the subject of cyberattacks by another nation (China).

This chapter discusses the following topics:

  • Continuing growth and innovation in the use of IT leading to increased dependency

  • Software complexity and quality

  • Fragmented data ownership and quality assurance

  • Military strength malware, toxic payloads and combined attacks

  • Potential consequences of outsourcing and offshoring

  • Loss of management skills in IT operations and information security

  • Too much information readily available to bad guys

  • Executive detachment

  • Organisational politics and turf battles

  • The special case of public sector IT

  • Justifying increased expenditures on information security and related disciplines

  • The legal framework surrounding information security

Top

2. Growth In Innovation And Use Of It, Linkages And Dependencies

Two basic laws established many years ago continue to apply: Moore’s and Metcalfe’s.

Gordon Moore, a co-founder of Intel showed, in a paper published in 1965, that the number of transistors that can be placed on an integrated circuit doubles every eighteen months. This has since been re-interpreted into a statement that computing power doubles every two years (known as Moore’s Law). The trend is expected to continue for computer chips. (Moore, 1965).

Robert Metcalfe, one of the inventors of Ethernet, a networking technology, stated that “the value of a network grows as the square of the number of its users”. This was first mentioned around 1980 (Shapiro & Varian, 1999). Unlike Moore’s Law, Metcalfe's can't be quantified, because there are no standard tools for measuring value creating a reliance on IKIWISI (I’ll Know It When I See It).

This law is mentioned in the paper “Network Centric Warfare” (1998) in which Vice-Admiral Cebrowski states that by 1998 the elements for such warfare model were in place and would have broad impact on military operations.

Complete Chapter List

Search this Book:
Reset