Welcome!

Linux Containers Authors: Liz McMillan, Carmen Gonzalez, Pat Romanski, Mehdi Daoudi, Elizabeth White

Related Topics: Linux Containers

Linux Containers: Article

Experts: Worry more about insiders than cyberterrorism

From the Gartner IT Security Summit 2003 in Washington DC

(IDG News Service) — Enterprises worried about cybersecurity should pay more attention to their own employees than to the as-of-yet unrealized threat of cyberterrorism, two cybersecurity experts warned a group of IT professionals Tuesday.

Speaking at the Gartner IT Security Summit 2003, representatives of Gartner Inc. and the Center for Strategic and International Studies (CSIS) suggested that enterprises should worry more about their intellectual property leaking out through employees or small-time hackers than their entire networks crashing from attacks of organized cyberterrorists.

The threat of cyberterrorism to enterprises may be overstated, but the threat of less organized attacks may be understated in current discussions about cybersecurity, said CSIS director James Lewis.

While a host of security experts have called on the U.S. and its allies to be vigilant against cyberterrorism, think tank director Lewis said he's seen no evidence of large cyberterrorist attacks yet.

The U.S. has counted more than 1,800 physical terrorism attacks since 1995, Lewis noted, but no major cyberterrorism in that time frame. "Kinetic weapons are much more effective right now," Lewis added.

However, enterprises should be worried about attacks, whether they are from inside employees or outsiders because they have more property than individuals do, and fewer ways to protect themselves than nations do. Enterprises are where the money is in cyber attacks, whether it be intellectual property, extortion or financial data, Lewis said, with loss of intellectual property and sensitive data the fastest growing cybersecurity loss.

"You get a lot of attention on cyberterrorism and Osama bin Laden sitting in front of a keyboard, but you ought to be more worried about insiders," Lewis said to close to 1,000 attendees of the Gartner conference. "The primary target is companies, and we probably put not enough effort into thinking about how to protect them."

Individual hackers will increasingly become another threat to both security and privacy because of their access to ever more powerful technology, added Richard Hunter, a vice president at Gartner and co-chairman of the conference. By 2008, Gartner estimates home computers will have 40-GHz processors and 1.3T bytes of storage, he said, leading to both beneficial and dangerous uses of home computers.

"That's enough to do data mining at home," Hunter said. "When we think about an environment that involves governments collecting information, that involves enterprises gathering information, we now have to think about an environment in which individuals are going to have significant power to gather and analyze and use information."

An enterprise's greatest strength and greatest weakness are often its employees, whether they make mistakes in not following security best practices or they have malicious intent, added Casey J. Dunlevy, project lead at the CERT Analysis Center at Carnegie Mellon University. Because of that, it's difficult for companies to come up with accurate threat models that can show them where to put their resources.

Companies need to prioritize their critical assets and should look into creating multidisciplinary teams that consider other security challenges such as physical security when drawing up a plan to protect critical assets, Dunlevy recommended. No company has enough money to "take the fortress mentality and protect everything," he added.

Dunlevy agreed with Lewis that cyberterrorism on its own may not be the top worry of most enterprises, but he suggested that cyber attacks could be a way for terrorists to supplement physical attacks. For example, shutting down a major city's traffic lights would be an effective way to create gridlock and multiply the impact of a physical attack.

"We're not necessarily looking for the 10-foot-tall cyber hacker to come out of the basement," Dunlevy said. "We're talking about people that know enough about technology to utilize it for different ends."

David M. Perry, the global director of education for security vendor Trend Micro Inc., said in an interview that small businesses and individuals should look for the same security protection and attention from vendors that enterprises get. Small- and medium-sized businesses should demand that their Internet service providers act as their enterprise when getting deals with large security vendors, he recommended.

Separately, Gartner released a study Tuesday saying that 2003 will be the first year in history in which most industries will spend 5 percent of their IT budgets on security. Security spending will have grown at a compound annual rate of 28 percent between 2001 and the end of 2003, Gartner said, while IT budgets overall will have grown only 6 percent during the same time.

It's in security vendors' best interest to focus on selling their products to enterprises, not to individuals or smaller businesses, Perry added. "They say (enterprise security) is where the danger is, but what they mean is that's where the money is to sell their products," Perry added.

More Stories By Grant Gross

Grant Gross is a Washington Bureau correspondent for the IDG News Service, a Linux.SYS-CON.com affiliate.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Discover top technologies and tools all under one roof at April 24–28, 2017, at the Westin San Diego in San Diego, CA. Explore the Mobile Dev + Test and IoT Dev + Test Expo and enjoy all of these unique opportunities: The latest solutions, technologies, and tools in mobile or IoT software development and testing. Meet one-on-one with representatives from some of today's most innovative organizations
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and E...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.