01253nas a2200193 4500000000100000000000100001008004100002260000900043653003700052653001200089653001200101653001600113653003700129100001700166245005600183300001200239490000600251520080200257 2001 d c200110aInformation system vulnerability10ahacking10ahackers10aIT-security10acritical societal infrastructure1 aMichael Näf00aUbiquitous Insecurity? How to “Hack” IT Systems a104-1180 v73 a
There are several important obstacles to IT security: there is no direct return on investment, time-to-market impedes extensive security measures, and security mechanisms often have a negative impact on usability. On the other hand, today’s IT systems are undeniably very vulnerable and users—regardless of their profession or position—need to be aware of IT security to some degree. One way to create this awareness is to demonstrate the vulnerability of currently used IT systems. The article shows various examples of “hacking” techniques along with a few statements on the causes of the currently experienced “ubiquitous insecurity,” some security-related perspectives for the future, and a number of general suggestions on how to increase security in our networked world.