
Chapter 19 Risk management
577
E-security
7
Any advance in processes or technology creates risks. No real advance comes without
threats and even danger. This applies particularly to e-business. In almost all businesses
information has become critical. So, information security management has become a particu-
larly high priority. But herein lies the problem. The Internet, which is the primary medium
for conducting e-business, is by design an open non-secure medium. Since the original pur-
pose of the Internet was not for commercial purposes, it is not designed to handle secure
transactions. There is a trade-off between providing wider access through the Internet,
and the security concerns it generates. Three developments have amplified e-security con-
cerns. First, increased connectivity (who does not rely on internet-based systems?) means
that everyone has at least the potential to ‘see’ everyone else. Organizations want to make
Happy birthday! 1 May 2008 saw the 30
th
anniversary
of junk electronic mail, or spam as it has become known.
It was in 1978 that Gary Thuerk, a Marketing Executive
at the Digital Equipment Corporation (DEC), a US
mini-computer manufacturer, decided it would be a
great sales ploy to let Arpanet (the direct ancestor of
the Internet) researchers on the west coast of the USA
know that DEC had incorporated the network’s protocols
directly into one of its operating systems. So Thuerk’s
secretary typed in all the researchers’ addresses and
dispatched the message using the e-mail program, which
at the time was very primitive. But not all the recipients
were happy. Arpanet’s rules said that the network could
not be used for commercial purposes and not everyone
wanted to know about the content of the message; it just
seemed intrusive.
Since then unwanted Internet-distributed information
has gone on to irritate, infuriate and threaten the whole
Internet. For example, on 25 January 2003 the ‘SQL
Slammer’ worm, a rogue program, spread at frightening
speed throughout the Internet. It disrupted computers
around the world and, at the height of the attack, its
effect was such that half the traffic over the Internet
was being lost (see Figure 19.4). Thousands of cash
dispensers in North America ceased operating and one
Short case
Viruses, threats and 30 years
of spam
6
police force was driven back to using pencils and paper
when its dispatching system crashed. Yet security experts
believe that the SQL Slammer did more good than harm
because it highlighted weaknesses in Internet security
processes. Like most rogue software, it exploited a flaw
in a commonly used piece of software. Much commonly
used software has security flaws that can be exploited
in this way. Software producers issue ‘patch’ software
to fix flaws but this can actually direct Internet terrorists
to vulnerable areas in the software, and not all systems
managers get around to implementing all patches.
Nevertheless, every rogue program that penetrates
Internet security systems teaches a valuable lesson
to those working to prevent security failures.
Figure 19.4 Internet traffic percentage loss January 2003
Source: Alamy Images
M19_SLAC0460_06_SE_C19.QXD 10/20/09 9:55 Page 577