Page 336 -
P. 336

Chapter 8 Securing Information Systems 335


                  In general, cyberwarfare attacks have become much more widespread,
               sophisticated, and potentially devastating. There are 250,000 probes trying to
               find their way into the U.S. Department of Defense networks every hour, and
               cyberattacks on U.S. federal agencies have increased 150 percent since 2008.
               Over the years, hackers have stolen plans for missile tracking systems, satellite
               navigation devices, surveillance drones, and leading-edge jet fighters.
                   Cyberwarfare poses a serious threat to the infrastructure of modern societ-
               ies, since their major financial, health, government, and industrial institutions
               rely on the Internet for daily operations. Cyberwarfare also involves defend-
               ing against these types of attacks. The Interactive Session on Organizations
               describes some recent cyberwarfare attacks and their growing sophistication
               and severity.

               INTERNAL THREATS: EMPLOYEES

               We tend to think the security threats to a business originate outside the
                 organization. In fact, company insiders pose serious security problems.
               Employees have access to privileged information, and in the presence of
               sloppy internal security procedures, they are often able to roam throughout an
                 organization’s systems without leaving a trace.
                  Studies have found that user lack of knowledge is the single greatest cause
               of network security breaches. Many employees forget their passwords to access
               computer systems or allow co-workers to use them, which compromises the
               system. Malicious intruders seeking system access sometimes trick employees
               into revealing their passwords by pretending to be legitimate members of the
               company in need of information. This practice is called social engineering.
                  Both end users and information systems specialists are also a major source
               of errors introduced into information systems. End users introduce errors by
               entering faulty data or by not following the proper instructions for process-
               ing data and using computer equipment. Information systems specialists may
                 create software errors as they design and develop new software or maintain
               existing programs.


               SOFTWARE VULNERABILITY

               Software errors pose a constant threat to information systems, causing untold
               losses in  productivity. Growing complexity and size of software programs,
               coupled with demands for timely delivery to markets, have contributed to an
               increase in software flaws or vulnerabilities. For example, a software error in
               an iPad app for paying bills caused Citibank to double the charge for customer
               payments between July and December 2011. Some customers using their iPads
               to settle their cable bill or mortgage payment, for example, actually paid twice
               (Protess, 2012).
                  A major problem with software is the presence of hidden bugs or program
               code defects. Studies have shown that it is virtually impossible to eliminate all
               bugs from large programs. The main source of bugs is the complexity of
                 decision-making code. A relatively small program of several hundred lines will
               contain tens of decisions leading to hundreds or even thousands of different
               paths. Important programs within most corporations are usually much larger,
               containing tens of thousands or even millions of lines of code, each with many
               times the choices and paths of the smaller programs.
                  Zero defects cannot be achieved in larger programs. Complete testing simply
               is not  possible. Fully testing programs that contain thousands of choices and






   MIS_13_Ch_08 Global.indd   335                                                                             1/17/2013   3:10:20 PM
   331   332   333   334   335   336   337   338   339   340   341