. Military Space News .
Wake-Up Call To Business: Tighten Up On Information Security

Tyler Moore of the Computer Laboratories, University of Cambridge expanded, "Information security is now a mainstream political issue, and no longer the province of technologists alone," he said.
by Staff Writers
London, UK (SPX) Jul 07, 2008
According to the Department of Trade and Industry there are 4.5 million businesses in the UK of which 99.3% are small to medium sized enterprises (SMEs), employing 0-49 employees. These comprise 58.9% of the total workforce of 24.4 million and account for 51.9% of the 2,600 billion pound UK turnover.

Bruce Hallas, a specialist in information security, said "SMEs are particularly prone to poor or even non-existent information security.

As awareness of the importance of information security increases, the SMEs stand to lose competitiveness, potentially losing contracts with existing clients and suffering the financial consequences that are increasingly arising from information security incidents."

An over reliance on Information Technology (IT) has developed over recent years. According to Hallas, this is the result of confusing Information Technology with Information Security (IS). With 'insufficient' money to invest in expensive information security expertise, many SME's are investing heavily in IT in the mistaken belief that IT will ensure IS.

"Yet the largest business drivers for security investment are contractual, regulatory, market pressures from consumers, corporate clients and the public sector. Not the typical domain of IT. The biggest security vulnerability lies with people," Hallas says.

"Security is about managing the risk from people, both known and unknown, interacting with your information and information systems. It is more about people management than technology."

Tyler Moore of the Computer Laboratories, University of Cambridge expanded, "Information security is now a mainstream political issue, and no longer the province of technologists alone," he said.

"People used to think that the internet was not secure because there was not enough of the right technology, not enough sophisticated cryptographic mechanisms, authentication or filtering etc. so advanced encryption, public key infrastructure and firewalls were added.

"The internet did not get any safer," he added. "In 1999 it became clear that even the latest and greatest technology will not solve all our problems if those who protect and maintain them are not sufficiently movitated. The issue is one of incentives."

The impact of an under-incentivised workforce can have devastating consequences in business such as denial of service attacks allowing viruses to infect the IT system, hospitals putting access to data above patient privacy, bank customers suffering phishing attacks by poorly designed banking systems.

"Economics can explain many of the failures and challenges in a new way" Tyler Moore said. "As companies are beginning to realise the value of good information security practice so security measures are being used not only to manage the evils of the attackers but also to support the business models of companies."

Now that the Achilles heel of the information security problem has been identified, companies, especially banks, often fight shy of divulging information about attacks, whether they have been successfully repelled or not because the information concerned may be sensitive.

Help is at hand in the form of a new report "Security Economics and the Internal Market" which outlines police options regarding the economic problems in providing IS.

The report's first recommendation is for the EU to issue a comprehensive breach notification law to notify consumers when their details have been compromised so they can protect themselves.

Examples of potential damage by inappropriate IS systems:

- Distributed denial service attacks where viruses infect machines. The users of the machines often do not know about it, but their machines are used remotely to target other people.

- Health records: Patients suffer when hospital system initiators put the simplicity of the IT system and its access to researchers above the value of patient privacy. Bank customers suffer when poorly designed systems enable phishing to happen and make fraud easier. Casino websites suffer whenever they are hit by denial of service website attacks and extorted for ransom.

- Phishing: "The practice of luring unsuspecting Internet users to a fake Web site by using authentic-looking email with the real organization's logo, in an attempt to steal passwords, financial or personal information, or introduce a virus attack; the creation of a Web site replica for fooling unsuspecting Internet users into submitting personal or financial information or passwords."

Community
Email This Article
Comment On This Article

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Economic and Social Research Council



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Fujifilm Unveils GPS-Based Data Tape Tracker
Valhalla NY (SPX) Nov 08, 2007
Fujifilm today announced the Fujifilm Tape Tracker, a unique, high performance data asset management solution that improves the security and shipping of data tape media. Designed to fit inside a standard tape media case, the Fujifilm Tape Tracker combines leading GPS technology and a web-based application to provide CIOs and data managers with location and tracking information in real time.







  • Bush, Sarkozy fought fiercely at last G8: Abe
  • Walker's World: France has nowhere to go
  • Britain backs French ambitions on European defence
  • Far Eastern Patriot Games

  • US to consult allies before commenting on Iran nuclear response
  • North Korea nuclear process at 'pivotal point': US
  • Iran says any attack on its nuclear sites means war
  • Russia slams US nuclear disarmament proposals: report

  • Lockheed Martin GMLRS Rocket Increases Standoff Range In Recent Test
  • US Navy Conducts First Test Of Raytheon's Standard Missile 6
  • Lockheed Gets Air Force Deal For Joint Air-To-Surface Standoff Missile Production
  • Olympics: China deploys missiles to guard Games

  • US-Russia ties could worsen as US prepares to sign missile deal
  • Israel successfully tests missile interceptor: report
  • US, Poland reach tentative pact on missile shield
  • Lockheed Martin's THAAD Weapon System Achieves First Successful Intercept Of Separating Target

  • EU airline pollution plan could spark trade wars: industry officials
  • China's new turboprop rolls off production line: official media
  • European airlines angered by EU 'CO2 tax'
  • China to roll out new turboprop plane: report

  • AeroVironment Gets UAV Contract For Special Operations Command All Environment Capable Variant
  • Lockheed Martin To Develop Manned And Unmanned Mission Management System For US Minehunters
  • Rockwell Collins Controls And Lands Wing-Damaged UAV
  • Predator, Reaper Unit Becomes Air Expeditionary Wing

  • Military Matters: Last train from Baghdad
  • Iraqi assembly in closed session to discuss US pact
  • Outside View: Iraq realities -- Part 2
  • Dogs of War: A small step for contractors

  • US wanted to test sarin on Australian troops: report
  • Raytheon Solipsys Releases 3-D Visualization Tool
  • Lockheed Martin EQ-36 Counterfire Target Acquisition Radar Completes CDR
  • Vumii Gives Security Operators Ability To Visually Assess Targets Detected By Radar

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement