TY - JOUR KW - Information system vulnerability KW - hacking KW - hackers KW - IT-security KW - critical societal infrastructure AU - Michael Näf AB -
There are several important obstacles to IT security: there is no direct return on investment, time-to-market impedes extensive security measures, and security mechanisms often have a negative impact on usability. On the other hand, today’s IT systems are undeniably very vulnerable and users—regardless of their profession or position—need to be aware of IT security to some degree. One way to create this awareness is to demonstrate the vulnerability of currently used IT systems. The article shows various examples of “hacking” techniques along with a few statements on the causes of the currently experienced “ubiquitous insecurity,” some security-related perspectives for the future, and a number of general suggestions on how to increase security in our networked world.
BT - Information & Security: An International Journal DA - 2001 DO - http://dx.doi.org/10.11610/isij.0706 LA - eng N2 -There are several important obstacles to IT security: there is no direct return on investment, time-to-market impedes extensive security measures, and security mechanisms often have a negative impact on usability. On the other hand, today’s IT systems are undeniably very vulnerable and users—regardless of their profession or position—need to be aware of IT security to some degree. One way to create this awareness is to demonstrate the vulnerability of currently used IT systems. The article shows various examples of “hacking” techniques along with a few statements on the causes of the currently experienced “ubiquitous insecurity,” some security-related perspectives for the future, and a number of general suggestions on how to increase security in our networked world.
PY - 2001 SP - 104 EP - 118 T2 - Information & Security: An International Journal TI - Ubiquitous Insecurity? How to “Hack” IT Systems VL - 7 ER -