The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2008 vol.6)
pp: 77-81
Roland L. Trope , Trope and Schramm, LLP
William J. Adams , US Military Academy, West Point
ABSTRACT
As enterprises increasingly depend on digitized data and seek commercial opportunities from accelerated digital access and transmission, senior management and boards of directors haven't sufficiently updated their enterprises' security protections on digitally stored information. Consequently, new and increasingly frequent attacks have occurred against their digital information assets. Enterprises must "harden the target" to protect against attacks against these assets.
INDEX TERMS
target hardening, digital information assets, digital attacks, digital protection
CITATION
Roland L. Trope, William J. Adams, "Hardening the Target", IEEE Security & Privacy, vol.6, no. 5, pp. 77-81, September/October 2008, doi:10.1109/MSP.2008.118
REFERENCES
1. US Computer Emergency Response Team (CERT), "Cyber Security Response to Physical Security Breaches,"28 Nov. 2007; www.us-cert.gov/reading_roomcssp_cyberresponse0712.pdf .
2. J. Walden, A.H. Southwell, and A. Goodman, "Data Breaches: Expect a Rise in Litigation," New York Law J.,12 May 2008, p. S4.
3. M. Peel and K. Allison, "Devil in the Details: Why Personal Data are Ever More Open to Loss and Abuse," Financial Times,25–26 Dec. 2008, p. 5.
4. E.M. Power and R.L. Trope, Sailing in Dangerous Waters: A Director's Guide to Data Governance, Am. Bar Assoc., 2005.
5. Nash v. The Port Authority of New York and New Jersey, New York Law J.,2 May 2008, pp. 26, 34–35 (New York Appellate Division, First Department).
6. C.M. Godfrey, "In re The Walt Disney Company Derivative Litigation," Business Law Today, July/Aug. 2008, p. 47.
7. "In the Matter of the Complaint of The City of New York as Owner and Operator of the M/V Andrew J. Barberi," memorandum and order 03-CV-6049, 26 Feb. 2007; http://63.72.236.16/pub/rulings/cv/200303cv6049mo22607.pdf .
8. United States v. Carroll Towing Co., Federal Reporter, 2nd Series, vol. 159, 1947, p. 173 (US Court of Appeals for the Second Circuit).
9. S. Gorman, "US Fears Threat of Cyberspying at Olympics," Wall Street J.,17 July 2008, p. 16; http://online.wsj.com/articleSB121625646058760485.html .
10. Department of Homeland Security, Office of Intelligence and Analysis, (U) Foreign Travel Threat Assessment: Electronic Communications Vulnerabilities, Homeland Security Assessment, 10 June 2008; http://online.wsj.com/public/resources/documents cyber-threatassessment-07172008.pdf .
11. United States v. Valueclick, Inc., case no. CV08-01711, 27 Mar. 2008, p. 8 (consent decree for defendant to pay civil penalty of US$2.9 million); www.ftc.gov/os/caselist/0723111index.shtm .
12. In the Matter of The TJX Companies, Inc., file no. 072 3055, agreement containing consent order, 27 March 2008, p. 3; www.ftc.gov/os/caselist/0723055index.shtm .
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool