Page 449 - Using MIS
P. 449
Q9 2025? 417
affecting mobile devices. But security on these devices will be improved as threats emerge that
exploit their vulnerabilities. This cat-and-mouse game is likely to continue for at least the next
10 years. No super-safeguard will be devised to prevent computer crime, nor will any particular
computer crime be impossible to thwart. However, the skill level of this cat-and-mouse activity
is likely to increase, and substantially so. Because of increased security in operating systems
and other software, and because of improved security procedures and employee training, it will
become harder and harder for the lone hacker to find some vulnerability to exploit. Not impos-
sible, but vastly more difficult.
So, what will happen? Cloud vendors and major organizations will continue to invest in
safeguards; they’ll hire more people (maybe you), train them well, and become ever more diffi-
cult to infiltrate. Although some criminals will continue to attack these fortresses, most will turn
their attention to less protected, more vulnerable, midsized and smaller organizations and to
individuals. You can steal $50 million from one company or $50 from a million people with the
same cash result. And, in the next 10 years, because of improved security at large organizations,
the difficulty and cost of stealing that $50 million will be much higher than stealing $50 a million
times. Take another look at Figure 10-7—and not for the purpose of the exam!
Part of the problem is porous national borders. People can freely enter the United States
electronically without a passport. They can commit crimes with little fear of repercussions.
There are no real electronic IDs. Cyber-gangs are well organized, financially motivated, and
possibly state-sponsored. Electronic lawlessness is the order of the day. If someone in Romania
steals from Google, Apple, Microsoft, or Boeing and then disappears into a cloud of networks
in Uzbekistan, do those large organizations have the resources, expertise, and legal authority to
pursue the attackers? What if that same criminal steals from you in Nashville? Can your local or
state law enforcement authorities help? And, if your portion of the crime is for $50, how many
calls to Uzbekistan do they want to make?
At the federal level, finances and politics take precedence over electronic security. The situ-
ation will likely be solved as it was in the past. Strong local “electronic” sheriffs will take control
of their electronic borders and enforce existing laws. It will take at least a couple decades for this
to happen. Technology is moving faster than either the public or elected officials can educate
themselves.
Take yet another look at Figure 10-7. Send a copy to your loved ones.