Skip to main content
  • 1169 Accesses

Abstract

Since the Target breach of 2013, there have been a relentless stream of highly publicized cyber-attacks against and vulnerabilities in systems, applications, organizations, processes, and even people. Many times, the victim organizations release statements designed to make it appear as if nothing could have stopped the attacks from happening. The combination of these attacks and the claims that there was no possible defense for those attacks make it easy for organizations to see the situation as hopeless, especially for the nontechnical executive community. Many of the vulnerabilities and methods for exploiting them are highly technical in nature and the attackers' relative skill makes it seem as if organizations are facing impossible odds. However, most breaches or attacks, in retrospect, yield a change in process or program that could've prevented the breach entirely, or limited the damage caused by the attack. Many of the claims that defense is impossible are designed to escape liability on the part of the victim organization; and we, as people and a business community, have faced similar odds before and found a way to prevail.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    FBI, 2010. Accessed April 19, 2016. https://www.fbi.gov/about-us/history/brief-history .

  2. 2.

    “The History of the FDIC | Investopedia,” Investopedia, 2008. Accessed April 19, 2016. http://www.investopedia.com/articles/economics/09/fdic-history.asp .

  3. 3.

    “Dye Packs Foil Bank Robbers’ Clean Getaways.” Tribunedigital-sunsentinel. 1989. Accessed April 19, 2016. http://articles.sun-sentinel.com/1989-11-19/news/8902100716_1_dye-packs-bank-robbers-robbery .

  4. 4.

    “The History of Video Security Cameras [Infographic].” Video Security and CCTV Surveillance Blog –. Accessed April 19, 2016. http://www.supercircuits.com/resources/blog/the-history-of-video-security-cameras .

  5. 5.

    “History of Bank Robberies,” Crime Library. Accessed April 19, 2016. http://www.crimemuseum.org/crime-library/history-of-bank-robberies .

  6. 6.

    “World Development Indicators, Google Public Data Explorer. Accessed May 2, 2016. https://www.google.com/publicdata/explore?ds=d5bncppjof8f9_ .

  7. 7.

    “World Development Indicators,” Google Public Data Explorer. Accessed May 2, 2016. https://www.google.com/publicdata/explore?ds=d5bncppjof8f9_ .

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Jeremy Wittkop

About this chapter

Cite this chapter

Wittkop, J. (2016). Deja Vu. In: Building a Comprehensive IT Security Program. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2053-5_10

Download citation

Publish with us

Policies and ethics