Page 338 -
P. 338
Chapter 8 Securing Information Systems 337
ligence, stated that if even a single large American these capabilities are still evolving. Will the United
bank were successfully attacked, it would have an States and other nations be ready when the next
order-of-magnitude greater impact on the global Stuxnet appears?
economy than the World Trade Center attacks, and
that the ability to threaten the U.S. money supply is Sources: Brian Royer, “Stuxnet, The Nation’s Power Grid, And The
Law Of Unintended Consequences, Dark Reading, March 12, 2012;
the financial equivalent of a nuclear weapon.
Thomas Erdbrink, “Iran Confirms Attack by Virus That Collects
Many security experts believe that U.S. cybersecu- Information,” The New York Times, May 29, 2012; Nicole Perlroth,
rity is not well-organized. Several different agencies, “Virus Infects Computers Across Middle East,” The New York Times,
May 28, 2012; Thom Shanker and Elisabeth Bumiller, “After Suffering
including the Pentagon and the National Security
Damaging Cyberattack, the Pentagon Takes Defensive Action,” The
Agency (NSA), have their sights on being the leading New York Times, July 15, 2011; Robert Leos, “Secure Best Practices
agency in the ongoing efforts to combat cyberwar- No Proof Against Stuxnet,” CSO, March 3, 2011; Lolita C. Baldor,
fare. The first headquarters designed to coordinate “Pentagon Gets Cyberwar Guidelines,” Associated Press, June 22,
2011; William J. Broad, John Markoff, and David E. Sanger, “Israel
government cybersecurity efforts, called Cybercom, Tests on Worm Called Crucial in Iran Nuclear Delay,” The New York
was activated in May 2010 in the hope of resolving Times, January 15, 2011; George V. Hulme, “SCADA Insecurity” and
this organizational tangle. In May 2011 President Michael S. Mimoso, “Cyberspace Has Gone Offensive,” Information
Security’s Essential Guide to Threat Management (June 14, 2011); and
Barack Obama signed executive orders weaving
Sibhan Gorman and Julian A. Barnes, “Cyber Combat: Act of War,”
cyber capabilities into U.S. military strategy, but The Wall Street Journal, May 31, 2011.
CASE STUDY QUESTIONS
1. Is cyberwarfare a serious problem? Why or why 4. What solutions for have been proposed for this
not? problem? Do you think they will be effective?
2. Assess the management, organization, and Why or why not?
technology factors that have created this problem.
3. What makes Stuxnet different from other
cyberwarfare attacks? How serious a threat is this
technology?
millions of paths would require thousands of years. Even with rigorous testing,
you would not know for sure that a piece of software was dependable until the
product proved itself after much operational use.
Flaws in commercial software not only impede performance but also create
security vulnerabilities that open networks to intruders. Each year security
firms identify thousands of software vulnerabilities in Internet and PC software.
For instance, in 2011, Symantec identified 351 browser vulnerabilities: 70 in
Chrome, about 50 in Safari and Firefox, and 50 in Internet Explorer. Some of
these vulnerabilities were critical (Symantec, 2012).
To correct software flaws once they are identified, the software vendor
creates small pieces of software called patches to repair the flaws without
disturbing the proper operation of the software. An example is Microsoft’s
Windows 7 Service Pack 1, which features security, performance, and stability
updates for Windows 7. It is up to users of the software to track these vulnera-
bilities, test, and apply all patches. This process is called patch management.
Because a company’s IT infrastructure is typically laden with multiple business
applications, operating system installations, and other system services, maintain-
ing patches on all devices and services used by a company is often time-consum-
ing and costly. Malware is being created so rapidly that companies have very
MIS_13_Ch_08 Global.indd 337 1/17/2013 3:10:20 PM