Page 132 - Using MIS
P. 132

Security Guide







            differentiatinG on SeCurity





            Information systems and nearly free data stor-       control over your identity. Soon criminals have piled up a
            age and data communications have created new, valuable   mountain of debt on your accounts, and your credit rating
            targets for crime. Before data was centralized in computers,   plummets. Your credit cards are useless, and you can’t obtain
            data theft had limited scope. When criminals target credit   replacements. With considerable work, agony, and expense,
            card  data  in  desk  drawers  in  homes,  a  thief  can  steal  the   you will be able to undo most of this damage, eventually. But
            data for perhaps eight credit cards per day. And those thefts   the near-term impact on your time and reputation is severe.
            involve considerable physical risk. But a computer criminal   Now, compare your situation to that of one of your
            can break into an organization’s database that holds data   coworkers who learned not to send sensitive data in email.
            on millions of credit cards. Those millions of records can be   You are spending hours solving your credit problem while
            downloaded to a computer in Africa and sold for $10 each   she  is learning new  skills,  networking  with  other profes-
            from an Internet site in Uzbekistan to computer gamers in   sionals, accomplishing extra projects at work, and so forth.
            the United States, all within 24
            hours. Or, even more graphically,
            a mugger waiting on a street cor-
            ner can rob only a single person
            in a few hours; a computer crimi-
            nal waiting on an Internet router
            (Chapter 6) can mug millions of
            people in those same few hours.
               For some, such computer
            crime is just a problem, but oth-
            ers find a way to turn that prob-
            lem into an opportunity to gain a
            competitive advantage. Namely,
            professionals and organizations
            that  take  steps  to  protect  them-
            selves and their organizations
            from such threats gain an advan-
            tage over those that do not. That
            sounds brutal, and perhaps it is,
            but it is also today’s reality.
               Consider yourself as an exam-
            ple. Suppose you send your Social
            Security number in an email.
            Unless  your  email  system  is  se-
            cure, and very few are, that Social
            Security number is vulnerable to
            an electronic mugger. Suppose
            your Social Security number is
            compromised, and someone gains
                                                                                          Source: Benoit Daoust/Shutterstock
        100
   127   128   129   130   131   132   133   134   135   136   137