02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DID: 4046925<br />

UNCLASSIFIEDJ1FO~Ol-l-lelJ8cL l:J5E ONLY<br />

Scott MacNealy's now-infamous quote,162_"you have zero privacy anyway. Get<br />

over it."-may no longer be an overstatement. At <strong>the</strong> very least, it should serve as a<br />

warning to Internet users to be wary of all products and services, but especially new<br />

ones that promise to do things faster, better, easier, and cheaper. There is almost<br />

always a hidden cost, often in weakened security and compromised privacy.<br />

The costs, however, are not always so "hidden." Many are affecting <strong>the</strong> bottom line<br />

and <strong>the</strong> budgets of businesses and governments. "Dealing with viruses, spyware,<br />

PC <strong>the</strong>ft and o<strong>the</strong>r computer-related crimes costs U.S. businesses a<br />

s,taggering $67.2 billion a year, according to <strong>the</strong> FBI. The FBI calculated <strong>the</strong> price<br />

tag by extrapolating results from a survey of 2,066 organizations. The survey...found<br />

that 1,324 respondents, or 64 percent, suffered a financial loss from computer<br />

security incidents over a 12-month period.,,163 Fur<strong>the</strong>rmore, as both professionals<br />

and individuals become more security savvy, <strong>the</strong> threats become more insidious<br />

and <strong>the</strong>refore harder to detect and protect against. The "2007 Internet Threat<br />

Outlook," a report by software maker CA, predicted that "malware brokers will<br />

continue to piece toge<strong>the</strong>r threats such as Trojan horse viruses, worms and <strong>the</strong><br />

many forms of spyware to hide <strong>the</strong>ir attacks and evade technological defenses<br />

employed by both enterprises and consumers. With <strong>the</strong> level of professionalism<br />

rising quickly among <strong>the</strong> most sophisticated virus distributors, CA predicts that zeroday<br />

exploits, drive-by malware downloads and extremely intricate phishing schemes<br />

will continue to become more dangerous and harder to detect.,,164<br />

Especially worrisome is <strong>the</strong> proliferation of bots, <strong>the</strong> shortened version of 'robot,'<br />

which simply refers to any software designed to dig through data. For example,<br />

search engines use spider bots to crawl <strong>web</strong>pages to index <strong>the</strong>m; <strong>the</strong>re are<br />

shopping bots that look for <strong>the</strong> best prices for consumers; bots are at <strong>the</strong> heart of<br />

data mining, <strong>the</strong> process of finding patterns in enormous amounts of data. But "bad<br />

bots" create a virus-like infection under <strong>the</strong> remote control of a distant computer,<br />

network, or individual. This new threat exploits vulnerabilities in security subsystems<br />

162 Polly Sprenger, "Sun on Privacy: Get Over It," Wired, 26 January 1999,<br />

(14 November 2006).<br />

163 Joris Evers, "Computer crime costs $67 billion, FBI says," CNET News.com, 19 January 2006,<br />

(30 January 2007).<br />

164 Matt Hines, "CA Predicts More Attacks on Experienced Users," eWeek via Yahoo News, 25<br />

January 2007, (31 January 2007).<br />

UNCLASSIFIEDj'jI-O~ Ol-l-lelJ8cL tJSE ONLY 515

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!