| Chapter 54 –  | 
                                          The Future of Information Security | 
                                        
                                     
                                        
                                    Peter Tippett
  Chapter Contents:
 
 
                                       
                                          |    | 
                                          54.1 | 
                                             | 
                                          Risk Equation
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          54.1.1 | 
                                             | 
                                          Threat
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.1.2 | 
                                             | 
                                          Vulnerability
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.1.3 | 
                                             | 
                                          Cost and Economic Impact
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.1.4 | 
                                             | 
                                          Risk
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.2 | 
                                             | 
                                          Seven Macrotrends in Internet Security
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          54.2.1 | 
                                             | 
                                          Increasing Complexity Drives Accelerating Growth in Vulnerability
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.2.2 | 
                                             | 
                                          Rapidly Changing Environment Drives Rapidly Changing Risks
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.2.3 | 
                                             | 
                                          Greater All-to-All Connectivity Drives Greater Malicious Connectivity
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.2.4 | 
                                             | 
                                          Growth in Internet Users Drives Growth in Internet Abusers
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.2.5 | 
                                             | 
                                          Internet Anonymity Drives Tendency toward Abuse
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          52.2.6 | 
                                             | 
                                          "E-Democritization" Drives Greater Power and Access for Abusers
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.2.7 | 
                                             | 
                                          Lack of Accepted Security Processes Drives the Pursuit of Dogma
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.2.7.1 | 
                                             | 
                                          Password Policies
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          54.2.7.2 | 
                                             | 
                                          Encryption
                                                     
                                           | 
                                        
                                       
                                          |    | 
                                          54.2.8 | 
                                             | 
                                          Five Microtrends in Internet Security
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.3 | 
                                             | 
                                          Dynamic, Holistic Security Process
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          54.3.1 | 
                                             | 
                                          Strongest Security: Fix Simple Things, and Repeat Often
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.3.2 | 
                                             | 
                                          It Takes Three Mistakes to Kill You
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.3.3 | 
                                             | 
                                          Coping with Malicious Code
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.3.4 | 
                                             | 
                                          Insider Threats
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.3.5 | 
                                             | 
                                          Effective Risk Management
                                                   
                                           | 
                                        
                                       
                                          |    | 
                                          54.4 | 
                                             | 
                                          Envisioning the Future
                                                 
                                           | 
                                        
                                       
                                          |    | 
                                          54.5 | 
                                             | 
                                          Notes
                                                 
                                           | 
                                        
                                     
  | 
                            
                         
                      | 
                  
                  
                      |