The Wayback Machine - https://web.archive.org/web/20190227164903/http://security.sys-con.com/node/43319

Welcome!

Cloud Security Authors: Liz McMillan, Pat Romanski, Elizabeth White, Zakia Bouachraoui, Yeshim Deniz

Related Topics: IBM Cloud, Cloud Security

IBM Cloud: Article

Security in Our Virtual World

Security in Our Virtual World

Nothing in life is completely secure. Think about it - when Julius Caesar took that famous walk to work on a fateful March morning, I'm sure he felt rather secure; after all, he was Caesar. Did Caesar think his life was about to end and become the prototype for countless Mafia hits in Hollywood movies and the real world? Of course not. The Internet and all of its technologies are no exception. Thousands of specific security problems have been discovered and fixed since the inception of the Internet. If you're using up-to-date firewalls, application servers, operating systems, and Web browsers - with all of the latest updates and security patches applied as each vendor prescribes - you are usually safe from known attacks. However, nobody is safe from attacks directed at weaknesses that haven't yet been discovered.

If somebody tells you that anything involving technology is 100% safe because hackers aren't smart enough to exploit vulnerabilities, you're either speaking with a liar or a fool. I've discovered some security problems on my own, and I'm pretty sure that I'm not the smartest person in the world. When one group of hackers creates an attack and shares it with other idiots, we're all in trouble.

There are two classes of security problems: nuisances and security breaches. A nuisance attack merely prevents you from getting your work done; for example, it may cause your computer to crash, delete your files, or give you and all of your associates a virus. In most cases nuisance attacks are initiated by the socially maladjusted, the same people you tend to avoid in the real world. These people are angry over being isolated and they blame society as a whole for their personal disappointments and failures. Learning to write computer code that inconveniences people with real lives really appeals to this group.

Security breaches are more serious. There are two types of security breaches. In the first, your private data is stolen and used by the thieves for some type of financial benefit to themselves. The second type is caused by some type of organized group or government that wants to disrupt the economy. The first group - the world's computer-literate criminal class - puts a tremendous amount of time into trying to steal credit card numbers and other data that can be sold on the open market. These are small groups and individuals with limited resources looking for big payoffs. They are primarily the problem of banks, credits card processors, and large corporate data repositories. The thieves who recently breached a security system to get access to about 5.6 million Visa and MasterCard accounts are of this type.

Visa and MasterCard said the thieves could access as many as 2.2 million accounts after breaching the security system of a company that processes credit card transactions on behalf of merchants. The affected accounts make up almost 1 percent of the 574 million Visa and MasterCard accounts in the United States - now that could be a big payoff.

The other type of breach - the kind aimed at disrupting our economy - is everyone's problem. The groups behind such attacks have potentially unlimited budgets to do whatever damage they may want to inflict. We are standing on the verge of the world's first virtual war - a war that will have real-world consequences. Currently there is no easy way to protect yourself from this last group, as they are playing by the real rules of war.

The one thing you should never do is to glorify these groups by calling them hackers, as they wear the name like a badge of honor. Call them what they really are - idiots, fools, thieves, and criminals. As long as there is some perceived benefit to people who cause computer trouble - be it for fun, profit, or political goals - security will remain an issue.

To quote Don Corleone, "This is the business that we have chosen to be in."

More Stories By Jacques Martin

Jack Martin, editor-in-chief of WebSphere Journal, is cofounder and CEO of Simplex Knowledge Company (publisher of Sarbanes-Oxley Compliance Journal http://www.s-ox.com), an Internet software boutique specializing in WebSphere development. Simplex developed the first remote video transmission system designed specifically for childcare centers, which received worldwide media attention, and the world's first diagnostic quality ultrasound broadcast system. Jack is co-author of Understanding WebSphere, from Prentice Hall.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
ScaleMP is the leader in virtualization for in-memory high-end computing, providing higher performance and lower total cost of ownership as compared with traditional shared-memory systems. The company's innovative Versatile SMP (vSMP) architecture aggregates multiple x86 systems into a single virtual x86 system, delivering an industry-standard, high-end shared-memory computer. Using software to replace custom hardware and components, ScaleMP offers a new, revolutionary computing paradigm. vSMP F...
History of how we got here. What IoT devices are most vulnerable? This presentation will demonstrate where hacks are most successful, through hardware, software, firmware or the radio connected to the network. The hacking of IoT devices and systems explained in 6 basic steps. On the other side, protecting devices continue to be a challenging effort. Product vendors/developers and customers are all responsible for improving IoT device security. The top 10 vulnerabilities will be presented a...
DSR is a supplier of project management, consultancy services and IT solutions that increase effectiveness of a company's operations in the production sector. The company combines in-depth knowledge of international companies with expert knowledge utilising IT tools that support manufacturing and distribution processes. DSR ensures optimization and integration of internal processes which is necessary for companies to grow rapidly. The rapid growth is possible thanks, to specialized services an...
CloudEXPO has been the M&A; capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
IT professionals are also embracing the reality of Serverless architectures, which are critical to developing and operating real-time applications and services. Serverless is particularly important as enterprises of all sizes develop and deploy Internet of Things (IoT) initiatives. Serverless and Kubernetes are great examples of continuous, rapid pace of change in enterprise IT. They also raise a number of critical issues and questions about employee training, development processes, and opera...
Most organizations are awash today in data and IT systems, yet they're still struggling mightily to use these invaluable assets to meet the rising demand for new digital solutions and customer experiences that drive innovation and growth. What's lacking are potent and effective ways to rapidly combine together on-premises IT and the numerous commercial clouds that the average organization has in place today into effective new business solutions. New research shows that delivering on multicloud e...
This month @nodexl announced that ServerlessSUMMIT & DevOpsSUMMIT own the world's top three most influential Kubernetes domains which are more influential than LinkedIn, Twitter, YouTube, Medium, Infoworld and Microsoft combined. NodeXL is a template for Microsoft® Excel® (2007, 2010, 2013 and 2016) on Windows (XP, Vista, 7, 8, 10) that lets you enter a network edge list into a workbook, click a button, see a network graph, and get a detailed summary report, all in the familiar environment of...
Atlantix Global Systems, a division of CXtec Inc., is one of the largest resellers of enterprise-class, secondary market equipment in the world. Atlantix Global provides a specialized, responsible method of streamlining the ITAD process that saves time, reduces expenses and ensures a secure solution, from start to finish. Atlantix Global has achieved certifications for ISO 14001:2015 and ISO 9001:2015 for asset recovery, OHSAS 18001:2007 for safety and R2:7/2013 for electronics recycling. Atlant...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...