linux operating commands and unix operating commands

Cyberspace: The Greatest Cybersecurity Threat for 2009?


 
Thread Tools Search this Thread
# 1  
Old 12-29-2008
Cyberspace: The Greatest Cybersecurity Threat for 2009?

Soon I will publish my The Top Ten Cybersecurity Threats for 2009.However, before doing so, let's take a look at some interesting aspectsof The Top Ten Cybersecurity Threats for 2008.  In my cybersecurity threat list for 2008, I mentioned:
- Criminal manipulation and subversion of financial markets.

What we observed in 2008 was much more than criminal threats. Now weare seeing both intended and unintended consequences of cyberspace.  For example, analysts from competing banks use the Internet to spread“doom and gloom” rumors and flawed analysis to do serious harm to theircompetitors.

In my post Cyberattack! Manipulation and Subversion of Financial Markets! we discussed the situation of a direct competitor to E*Trade Bank, Citigroup, using the power of cyberspace, rumors and (mis)information to manipulate investor confidence in  E*Trade (ETFC). This might have not been such an eyebrow raising event if the analystrumor, released like a bomb in cyberspace, was by a disinterested thirdparty.  The “cybernews bomb” was released by a direct competitor withtheir own subprime balance sheet problems.  In reality, Citigroup camecloser to bankruptcy than E*Trade!

This is a direct abuse of cyberspace and a purposeful, maliciousaction that can threaten every business in today's modern networked,connected world.

Moreover, potential more harmful threats are the unintended, notdirectly malicious “doom and gloom” reports, analysts opinions and newsstories, where the entire cyberworld is full of “doom and gloom”,driving the world's global economics into a downward spiral.

In other words, the biggest looming threat to cyberspace is not thelow level hacks and attacks that IT professional often discuss.   Thebiggest threat is cyberspace itself and how malicious rumors incyberspace can destroy confidence in sound businesses in milliseconds. In addition, cyberspace “doom and gloom” has taken on a life of itsown, much like a global personality. Unfortunately, we don't have“cyberdrugs” to treat “doom and gloom” global information-baseddepression.

Many folks are worried that the global economy will be even worse in2009.   Never in our history have we had such a global economicdownturn combined with global cyberspace “doom and gloom” messagingpumped into our news readers and brains 24 hours a day, 365 days ayear, globally and instantaneously.

Indeed, cyberspace itself has become a serious threat, perhaps the greatest threat for 2009.

Originally published by Tim Bass in Prelude to The Top Ten Cybersecurity Threats for 2009 - Cyberspace

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. What is on Your Mind?

Virtualized Cyberspace, Cyberspace Consciousness and Simulation Theory - What Do You Think?

What do you think? Read this: Virtualized Cyberspace, Cyberspace Consciousness and Simulation Theory and comment below.... Are we in a computer simulation? Yes or No? Thanks! (0 Replies)
Discussion started by: Neo
0 Replies

2. What is on Your Mind?

Application for Virtualizing CyberSpace like Outer Space for Cyberspace Situational Awareness

Richard Zuech annotates his first experience flying in virtualized cyberspace hunting the bad guys! ... and he finds some! Application for Virtualizing CyberSpace like Outer Space for Cyberspace Situational Awareness (0 Replies)
Discussion started by: Neo
0 Replies

3. What is on Your Mind?

Calculating Warp Coordinates in Cyberspace - Cyberspace Situational Awareness

Please message me or post in this thread if anyone is interested in contributing some C, C++, or C# code for this project. Right now we have an open source C++ git project (created by someone else a few years ago) that fails when we try to compile on Ubuntu. I need someone to fix the make... (4 Replies)
Discussion started by: Neo
4 Replies

4. What is on Your Mind?

Cyberspace Situation Graphs - Cyberspace Situational Awareness

Hi. I've been very busy this month working on resurrecting my old projects related to "cyberspace situational awareness" (CSA) which began last month by surveying the downstream literature that referenced my papers in this area using Google Scholar and also ResearchGate and posting updates on my... (5 Replies)
Discussion started by: Neo
5 Replies

5. Shell Programming and Scripting

Take greatest value from second column

Dear All, Please help me, I have file input like this, 1 2142 215 2162 217 2842 285 2862 287 4002 401 4022 403 4822 1 2142 215 2162 217 2842 285 2862 287 4002 401 4022 403 4882 1 4801 (8 Replies)
Discussion started by: attila
8 Replies

6. UNIX for Dummies Questions & Answers

help! script to select line with greatest value 2 between columns

Hi, I’m trying to do something I haven’t done before and I’m struggling with how to even create the command or script. I have the following space delim file: gene accession chr chr_st begin end NN1 NC_024540 chr3 - 14000 14020 NN1 ... (10 Replies)
Discussion started by: wolf_blue
10 Replies

7. Shell Programming and Scripting

Using perl code find greatest number.

How would one go about finding the greatest number in an array of numbers using loops and if statements? For example, if you had an array like this: (4, 8, 3, 19, 6, 11) (3 Replies)
Discussion started by: DemonixX
3 Replies

8. Cybersecurity

The Top Ten Cybersecurity Threats for 2009 - Draft for Comments

Following up on my 2008 list of top cybersecurity threats, I have just published The Top Ten Cybersecurity Threats for 2009 for public comments. If you are interested in cybersecurity threats, kindly email your suggestions or comments directly to me (tim dot silkroad at gmail dot com).  I will... (0 Replies)
Discussion started by: Linux Bot
0 Replies
Login or Register to Ask a Question