22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

purposes, either to gain financially from it or to willfully corrupt or destroy what<br />

they find (they are usually referred to as black hat hackers, or sometimes as<br />

crackers).<br />

No matter what their inclination, these hackers are an IT systems nightmare for<br />

organizations of all sizes. Even well-intentioned hackers can create conditions<br />

that expose the information contained in an organization’s IT systems and create<br />

the potential for this information to be destroyed, corrupted, or accessed by less<br />

scrupulous people.<br />

Worse, it is not only white and black hat hackers that IT managers need to worry<br />

about, but also the very users that use the services of the IT infrastructure. Most<br />

of the time, the users are not malevolent; they simply make mistakes. But even<br />

innocent errors can affect an organization’s knowledge capital, and well-meaning<br />

users can be fooled into disclosing important information that exposes<br />

knowledge capital to sinister forces.<br />

1.1.2 The CSI/FBI Computer Crime and Security Survey<br />

To look at how bad things are presently, here is an interesting quote:<br />

“The United States' increasing dependency on information technology to<br />

manage and operate our nation's critical infrastructures provides a prime<br />

target to would be cyber-terrorists. Now, more than ever, the government and<br />

private sector need to work together to share information and be more<br />

cognitive of information security so that our nation's critical infrastructures are<br />

protected from cyber-terrorists.”<br />

This quote is from the CSI/FBI Computer Crime and Security Survey, which is<br />

available in electronic format directly from the Computer Security Institute (CSI)<br />

at the following URL:<br />

http://www.gocsi.com/forms/fbi/pdf.html<br />

The CSI and FBI<br />

CSI, which was established in 1974, is a San Francisco-based association of<br />

information security professionals. It has thousands of members worldwide and<br />

provides a wide variety of information and education programs to assist<br />

practitioners in protecting the information assets of corporations and<br />

governmental organizations.<br />

The Federal Bureau of Investigation (FBI), in response to an expanding number<br />

of instances in which criminals have targeted major components of information<br />

and economic infrastructure systems, has established the National Infrastructure<br />

Chapter 1. Fundamentals of IT security 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!