“Never
underestimate the time, expense, and effort an opponent will expend to break a code.” (Robert Morris)
Trites (2004) in 2004 stated that, the Information
Technology Advisory Committee (ITAC), a division of the CICA, surveyed roughly 50 individuals who are involved in information
technology. These individuals were asked to give feedback on ITAC's list of the most crucial issues facing people
in the IT industry. The participants' responses were tallied and showed that information privacy was their #1 concern,
followed by the security of wireless systems and network intrusion detection.
Trites (2003) reported that in the 2003 "Computer Crime and Security Survey" of the CSI,
56% of the respondents experienced financial losses due to customer breaches. Within the same survey, 46% of the
surveyed people detected system penetration from the outside and 45% from the inside." Despite
the reports published by the SANS Institute and other agencies, the incidences of malicious Internet use and abuse are,
by far, significantly underreported. A security breach can cause numerous probelms for any organization who has
stored information in databases and can quickly undermine the effort that was taken to build user confidence.
Many businesses and organizations go to great lengths to cover up and repair the damage done to their systems and client
accounts before the information becomes public.
|