Abstract
Since the Target breach of 2013, there have been a relentless stream of highly publicized cyber-attacks against and vulnerabilities in systems, applications, organizations, processes, and even people. Many times, the victim organizations release statements designed to make it appear as if nothing could have stopped the attacks from happening. The combination of these attacks and the claims that there was no possible defense for those attacks make it easy for organizations to see the situation as hopeless, especially for the nontechnical executive community. Many of the vulnerabilities and methods for exploiting them are highly technical in nature and the attackers' relative skill makes it seem as if organizations are facing impossible odds. However, most breaches or attacks, in retrospect, yield a change in process or program that could've prevented the breach entirely, or limited the damage caused by the attack. Many of the claims that defense is impossible are designed to escape liability on the part of the victim organization; and we, as people and a business community, have faced similar odds before and found a way to prevail.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
FBI, 2010. Accessed April 19, 2016. https://www.fbi.gov/about-us/history/brief-history .
- 2.
“The History of the FDIC | Investopedia,” Investopedia, 2008. Accessed April 19, 2016. http://www.investopedia.com/articles/economics/09/fdic-history.asp .
- 3.
“Dye Packs Foil Bank Robbers’ Clean Getaways.” Tribunedigital-sunsentinel. 1989. Accessed April 19, 2016. http://articles.sun-sentinel.com/1989-11-19/news/8902100716_1_dye-packs-bank-robbers-robbery .
- 4.
“The History of Video Security Cameras [Infographic].” Video Security and CCTV Surveillance Blog –. Accessed April 19, 2016. http://www.supercircuits.com/resources/blog/the-history-of-video-security-cameras .
- 5.
“History of Bank Robberies,” Crime Library. Accessed April 19, 2016. http://www.crimemuseum.org/crime-library/history-of-bank-robberies .
- 6.
“World Development Indicators, Google Public Data Explorer. Accessed May 2, 2016. https://www.google.com/publicdata/explore?ds=d5bncppjof8f9_ .
- 7.
“World Development Indicators,” Google Public Data Explorer. Accessed May 2, 2016. https://www.google.com/publicdata/explore?ds=d5bncppjof8f9_ .
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Jeremy Wittkop
About this chapter
Cite this chapter
Wittkop, J. (2016). Deja Vu. In: Building a Comprehensive IT Security Program. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2053-5_10
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2053-5_10
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2052-8
Online ISBN: 978-1-4842-2053-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)