@article{3245, keywords = {Information system vulnerability, hacking, hackers, IT-security, critical societal infrastructure}, author = {Michael Näf}, title = {Ubiquitous Insecurity? How to “Hack” IT Systems}, abstract = {
There are several important obstacles to IT security: there is no direct return on investment, time-to-market impedes extensive security measures, and security mechanisms often have a negative impact on usability. On the other hand, today’s IT systems are undeniably very vulnerable and users—regardless of their profession or position—need to be aware of IT security to some degree. One way to create this awareness is to demonstrate the vulnerability of currently used IT systems. The article shows various examples of “hacking” techniques along with a few statements on the causes of the currently experienced “ubiquitous insecurity,” some security-related perspectives for the future, and a number of general suggestions on how to increase security in our networked world.
}, year = {2001}, journal = {Information & Security: An International Journal}, volume = {7}, pages = {104-118}, month = {2001}, doi = {http://dx.doi.org/10.11610/isij.0706}, language = {eng}, }