Page 449 - Using MIS
P. 449

Q9 2025?       417

                                       affecting mobile devices. But security on these devices will be improved as threats emerge that
                                       exploit their vulnerabilities. This cat-and-mouse game is likely to continue for at least the next
                                       10 years. No super-safeguard will be devised to prevent computer crime, nor will any particular
                                       computer crime be impossible to thwart. However, the skill level of this cat-and-mouse activity
                                       is likely to increase, and substantially so. Because of increased security in operating systems
                                       and other software, and because of improved security procedures and employee training, it will
                                       become harder and harder for the lone hacker to find some vulnerability to exploit. Not impos-
                                       sible, but vastly more difficult.
                                           So, what will happen? Cloud vendors and major organizations will continue to invest in
                                       safeguards; they’ll hire more people (maybe you), train them well, and become ever more diffi-
                                       cult to infiltrate. Although some criminals will continue to attack these fortresses, most will turn
                                       their attention to less protected, more vulnerable, midsized and smaller organizations and to
                                       individuals. You can steal $50 million from one company or $50 from a million people with the
                                       same cash result. And, in the next 10 years, because of improved security at large organizations,
                                       the difficulty and cost of stealing that $50 million will be much higher than stealing $50 a million
                                       times. Take another look at Figure 10-7—and not for the purpose of the exam!
                                           Part of the problem is porous national borders. People can freely enter the United States
                                       electronically without a passport. They can commit crimes with little fear of repercussions.
                                       There are no real electronic IDs. Cyber-gangs are well organized, financially motivated, and
                                       possibly state-sponsored. Electronic lawlessness is the order of the day. If someone in Romania
                                       steals from Google, Apple, Microsoft, or Boeing and then disappears into a cloud of networks
                                       in Uzbekistan, do those large organizations have the resources, expertise, and legal authority to
                                       pursue the attackers? What if that same criminal steals from you in Nashville? Can your local or
                                       state law enforcement authorities help? And, if your portion of the crime is for $50, how many
                                       calls to Uzbekistan do they want to make?
                                           At the federal level, finances and politics take precedence over electronic security. The situ-
                                       ation will likely be solved as it was in the past. Strong local “electronic” sheriffs will take control
                                       of their electronic borders and enforce existing laws. It will take at least a couple decades for this
                                       to happen. Technology is moving faster than either the public or elected officials can educate
                                       themselves.
                                           Take yet another look at Figure 10-7. Send a copy to your loved ones.
   444   445   446   447   448   449   450   451   452   453   454