This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Hardening the Target
September/October 2008 (vol. 6 no. 5)
pp. 77-81
Roland L. Trope, Trope and Schramm, LLP
William J. Adams, US Military Academy, West Point
As enterprises increasingly depend on digitized data and seek commercial opportunities from accelerated digital access and transmission, senior management and boards of directors haven't sufficiently updated their enterprises' security protections on digitally stored information. Consequently, new and increasingly frequent attacks have occurred against their digital information assets. Enterprises must "harden the target" to protect against attacks against these assets.

1. US Computer Emergency Response Team (CERT), "Cyber Security Response to Physical Security Breaches,"28 Nov. 2007; www.us-cert.gov/reading_roomcssp_cyberresponse0712.pdf .
2. J. Walden, A.H. Southwell, and A. Goodman, "Data Breaches: Expect a Rise in Litigation," New York Law J.,12 May 2008, p. S4.
3. M. Peel and K. Allison, "Devil in the Details: Why Personal Data are Ever More Open to Loss and Abuse," Financial Times,25–26 Dec. 2008, p. 5.
4. E.M. Power and R.L. Trope, Sailing in Dangerous Waters: A Director's Guide to Data Governance, Am. Bar Assoc., 2005.
5. Nash v. The Port Authority of New York and New Jersey, New York Law J.,2 May 2008, pp. 26, 34–35 (New York Appellate Division, First Department).
6. C.M. Godfrey, "In re The Walt Disney Company Derivative Litigation," Business Law Today, July/Aug. 2008, p. 47.
7. "In the Matter of the Complaint of The City of New York as Owner and Operator of the M/V Andrew J. Barberi," memorandum and order 03-CV-6049, 26 Feb. 2007; http://63.72.236.16/pub/rulings/cv/200303cv6049mo22607.pdf .
8. United States v. Carroll Towing Co., Federal Reporter, 2nd Series, vol. 159, 1947, p. 173 (US Court of Appeals for the Second Circuit).
9. S. Gorman, "US Fears Threat of Cyberspying at Olympics," Wall Street J.,17 July 2008, p. 16; http://online.wsj.com/articleSB121625646058760485.html .
10. Department of Homeland Security, Office of Intelligence and Analysis, (U) Foreign Travel Threat Assessment: Electronic Communications Vulnerabilities, Homeland Security Assessment, 10 June 2008; http://online.wsj.com/public/resources/documents cyber-threatassessment-07172008.pdf .
11. United States v. Valueclick, Inc., case no. CV08-01711, 27 Mar. 2008, p. 8 (consent decree for defendant to pay civil penalty of US$2.9 million); www.ftc.gov/os/caselist/0723111index.shtm .
12. In the Matter of The TJX Companies, Inc., file no. 072 3055, agreement containing consent order, 27 March 2008, p. 3; www.ftc.gov/os/caselist/0723055index.shtm .
1. V. Prevelakis and D. Spinellis, "The Athens Affair," IEEE Spectrum, July 2007, p. 32.

Index Terms:
target hardening, digital information assets, digital attacks, digital protection
Citation:
Roland L. Trope, Monique Witt, William J. Adams, "Hardening the Target," IEEE Security & Privacy, vol. 6, no. 5, pp. 77-81, Sept.-Oct. 2008, doi:10.1109/MSP.2008.118
Usage of this product signifies your acceptance of the Terms of Use.