Sponsored Content
Special Forums Cybersecurity IT Security RSS Cyberspace: The Greatest Cybersecurity Threat for 2009? Post 302272144 by Linux Bot on Monday 29th of December 2008 08:50:08 PM
Old 12-29-2008
Cyberspace: The Greatest Cybersecurity Threat for 2009?

Soon I will publish my The Top Ten Cybersecurity Threats for 2009.However, before doing so, let's take a look at some interesting aspectsof The Top Ten Cybersecurity Threats for 2008.  In my cybersecurity threat list for 2008, I mentioned:
- Criminal manipulation and subversion of financial markets.

What we observed in 2008 was much more than criminal threats. Now weare seeing both intended and unintended consequences of cyberspace.  For example, analysts from competing banks use the Internet to spread“doom and gloom” rumors and flawed analysis to do serious harm to theircompetitors.

In my post Cyberattack! Manipulation and Subversion of Financial Markets! we discussed the situation of a direct competitor to E*Trade Bank, Citigroup, using the power of cyberspace, rumors and (mis)information to manipulate investor confidence in  E*Trade (ETFC). This might have not been such an eyebrow raising event if the analystrumor, released like a bomb in cyberspace, was by a disinterested thirdparty.  The “cybernews bomb” was released by a direct competitor withtheir own subprime balance sheet problems.  In reality, Citigroup camecloser to bankruptcy than E*Trade!

This is a direct abuse of cyberspace and a purposeful, maliciousaction that can threaten every business in today's modern networked,connected world.

Moreover, potential more harmful threats are the unintended, notdirectly malicious “doom and gloom” reports, analysts opinions and newsstories, where the entire cyberworld is full of “doom and gloom”,driving the world's global economics into a downward spiral.

In other words, the biggest looming threat to cyberspace is not thelow level hacks and attacks that IT professional often discuss.   Thebiggest threat is cyberspace itself and how malicious rumors incyberspace can destroy confidence in sound businesses in milliseconds. In addition, cyberspace “doom and gloom” has taken on a life of itsown, much like a global personality. Unfortunately, we don't have“cyberdrugs” to treat “doom and gloom” global information-baseddepression.

Many folks are worried that the global economy will be even worse in2009.   Never in our history have we had such a global economicdownturn combined with global cyberspace “doom and gloom” messagingpumped into our news readers and brains 24 hours a day, 365 days ayear, globally and instantaneously.

Indeed, cyberspace itself has become a serious threat, perhaps the greatest threat for 2009.

Originally published by Tim Bass in Prelude to The Top Ten Cybersecurity Threats for 2009 - Cyberspace

Image
Image

More...
 

8 More Discussions You Might Find Interesting

1. Cybersecurity

The Top Ten Cybersecurity Threats for 2009 - Draft for Comments

Following up on my 2008 list of top cybersecurity threats, I have just published The Top Ten Cybersecurity Threats for 2009 for public comments. If you are interested in cybersecurity threats, kindly email your suggestions or comments directly to me (tim dot silkroad at gmail dot com).  I will... (0 Replies)
Discussion started by: Linux Bot
0 Replies

2. Shell Programming and Scripting

Using perl code find greatest number.

How would one go about finding the greatest number in an array of numbers using loops and if statements? For example, if you had an array like this: (4, 8, 3, 19, 6, 11) (3 Replies)
Discussion started by: DemonixX
3 Replies

3. UNIX for Dummies Questions & Answers

help! script to select line with greatest value 2 between columns

Hi, I’m trying to do something I haven’t done before and I’m struggling with how to even create the command or script. I have the following space delim file: gene accession chr chr_st begin end NN1 NC_024540 chr3 - 14000 14020 NN1 ... (10 Replies)
Discussion started by: wolf_blue
10 Replies

4. Shell Programming and Scripting

Take greatest value from second column

Dear All, Please help me, I have file input like this, 1 2142 215 2162 217 2842 285 2862 287 4002 401 4022 403 4822 1 2142 215 2162 217 2842 285 2862 287 4002 401 4022 403 4882 1 4801 (8 Replies)
Discussion started by: attila
8 Replies

5. What is on Your Mind?

Cyberspace Situation Graphs - Cyberspace Situational Awareness

Hi. I've been very busy this month working on resurrecting my old projects related to "cyberspace situational awareness" (CSA) which began last month by surveying the downstream literature that referenced my papers in this area using Google Scholar and also ResearchGate and posting updates on my... (5 Replies)
Discussion started by: Neo
5 Replies

6. What is on Your Mind?

Calculating Warp Coordinates in Cyberspace - Cyberspace Situational Awareness

Please message me or post in this thread if anyone is interested in contributing some C, C++, or C# code for this project. Right now we have an open source C++ git project (created by someone else a few years ago) that fails when we try to compile on Ubuntu. I need someone to fix the make... (4 Replies)
Discussion started by: Neo
4 Replies

7. What is on Your Mind?

Application for Virtualizing CyberSpace like Outer Space for Cyberspace Situational Awareness

Richard Zuech annotates his first experience flying in virtualized cyberspace hunting the bad guys! ... and he finds some! Application for Virtualizing CyberSpace like Outer Space for Cyberspace Situational Awareness (0 Replies)
Discussion started by: Neo
0 Replies

8. What is on Your Mind?

Virtualized Cyberspace, Cyberspace Consciousness and Simulation Theory - What Do You Think?

What do you think? Read this: Virtualized Cyberspace, Cyberspace Consciousness and Simulation Theory and comment below.... Are we in a computer simulation? Yes or No? Thanks! (0 Replies)
Discussion started by: Neo
0 Replies
httppower(8)							     powerman							      httppower(8)

NAME
httppower - communicate with HTTP based power distribution units SYNOPSIS
httppower [--url URL] DESCRIPTION
httppower is a helper program for powerman which enables it to communicate with HTTP based power distribution units. It is run interac- tively by the powerman daemon. OPTIONS
-u, --url URL Set the base URL. INTERACTIVE COMMANDS
The following commands are accepted at the httppower> prompt: auth user:pass Authenticate to the base URL with specified user and password, using ``basic'' HTTP authentication which sends the user and password over the network in plain text. seturl URL Set the base URL. Overrides the command line option. get [URL-suffix] Send an HTTP GET to the base URL with the optional URL-suffix appended. post [URL-suffix] key=val[&key=val]... Send an HTTP POST to the base URL with the optional URL-suffix appended, and key-value pairs as argument. FILES
/usr/sbin/httppower /etc/powerman/powerman.conf ORIGIN
PowerMan was originally developed by Andrew Uselton on LLNL's Linux clusters. This software is open source and distributed under the terms of the GNU GPL. SEE ALSO
powerman(1), powermand(8), httppower(8), plmpower(8), vpcd(8), powerman.conf(5), powerman.dev(5), powerman-devices(7). http://sourceforge.net/projects/powerman powerman-2.3.5 2009-02-09 httppower(8)
All times are GMT -4. The time now is 04:45 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy