Computable.nl
  • Thema’s
    • Carrière
    • Innovatie & Transformatie
    • Cloud & Infrastructuur
    • Data & AI
    • Governance & Privacy
    • Security & Awareness
    • Software & Development
    • Werkplek & Beheer
  • Sectoren
    • Channel
    • Financiële dienstverlening
    • Logistiek
    • Onderwijs
    • Overheid
    • Zorg
  • Awards
    • Computable Awards
    • Nieuws
    • Winnaars
    • Partner worden
    • Inzending indienen
    • Inzendingen
  • Vacatures
    • Vacatures bekijken
    • Vacatures plaatsen
  • Bedrijven
    • Profielen
    • Producten & Diensten
  • Kennisbank
  • Magazine
    • Magazine
    • Adverteren in het magazine
  • Nieuwsbrief

Security problem grows

31 oktober 2002 - 23:004 minuten leestijdOpinieCloud & Infrastructuur
Martin Healey
Martin Healey

It is inevitable that as long as there is progress one advance brings with it at least one new problem. To be more accurate it is probably not an entirely new problem but one that has always been there but now becomes a far more significant one.

Usually the new problem generates a whole new industry to cope with it. As an example the advent of networked PCs in office environments created the market for cabling, bridges, network monitors, etc. Companies such as Cisco grew from this opportunity and while there was an established market for supporting cluster and SNA controllers, etc, it was the new companies that dominated.
Security is the latest and biggest new market sector in IT. From the day that interactive terminals were connected to a computer there has been a security problem, but the advent of the Internet has exposed the problem and it is now reaching very large proportions.
In the early days all input to a computer was in batch form, i.e. punched cards. Even the early terminals were connected to a special data preparation system, which fed data to the main computer but did not allow direct access to it. The minicomputer revolution changed all that. Digital lead the way by introducing the PDP-11 with the RSTS operating system (designed for interactive, multi-user scientific applications in the first place) as a small business system. IBM et al were forced to react and the interactive System 36 and 38 usurped the old batch oriented System 3. It simply snowballed from there and interactive terminals became the norm on all systems.
However security problems in that era, while still very important, were constrained to password management as much as anything else. Most systems could be easily broken into because some users learnt that they could store their password under a programmable function key, which any one in the know could press! The first lesson that was learnt from this was that discipline is all important, and still is.
The advent of networked PCs increased the security problem, but not because the PC was intrinsically more vulnerable than a character terminal, but because the same PC could be used for office functions as well as data processing. Thus there was a much bigger and more diverse set of users. This however is an example of how the price is worth paying because the benefits of increased functionality outweigh the cost of security.
However the Internet is a completely different story because now there are uncontrolled external users as well as employees who are potential users. Most Web-based systems are built independent of the main internal systems, using Application Servers to integrate the Web front-end with core systems. But while this provides an isolation between the Internet user and the main systems, the need for communication gateways means that there is a loop hole into other systems that clever hackers can (and do) exploit. It is problems such as a virus in an inoffensive e-mail that corrupts the PC network and therefore interferes with all the internal systems indirectly. Direct or indirect doesn’t matter, it is a problem! Interference with applications is one fear but the possibility of access to the databases is equally worrying.
The other security problem that the Internet creates is due to the basic nature of the service on offer. An interactive C2B e-commerce application must be attractive and easy to use (not that you would know that from the bulk of applications on offer today!) and yet be secure, both from the company and user perspectives. Security and ease of use are conflicting requirements and have always been a problem; the easiest way to have made the old mainframe systems easier to use would have been to turn the security off! There must be compromise in practice. In contrast the internal systems and B2B e-commerce are exposed to a more restricted set of professional users and are somewhat easier to control. Those users will more readily accept constraints imposed by security than Internet users. However there is still no place to hide because while professional misuse is lower in volume than Internet hacking, the magnitude of any single "hack" can be enormous. For years it has been thought that internal users accounted for 75% of computer fraud. Today it is about 50/50 but that is because external fraud has increased, not a reduction in the internal problems.
In summary security is a necessary evil which has to be addressed!

 
Martin Healey, pioneer development Intel-based computers en c/s-architecture. Director of a number of IT specialist companies and an Emeritus Professor of the University of Wales.

Meer over

Progress 4GLSoftwarebeheer

Deel

    Inschrijven nieuwsbrief Computable

    Door te klikken op inschrijven geef je toestemming aan Jaarbeurs B.V. om je naam en e-mailadres te verwerken voor het verzenden van een of meer mailings namens Computable. Je kunt je toestemming te allen tijde intrekken via de af­meld­func­tie in de nieuwsbrief.
    Wil je weten hoe Jaarbeurs B.V. omgaat met jouw per­soons­ge­ge­vens? Klik dan hier voor ons privacy statement.

    Whitepapers

    Computable.nl

    Hybride vergaderen herzien

    Wat moderne werkplekken vragen van meeting- en samenwerkingsomgevingen

    Computable.nl

    Virtualisatie heroverwogen

    Waarom enterprise IT opnieuw kijkt naar kosten, schaal en flexibiliteit

    Computable.nl

    Hoe raakt NIS2 ook jouw bedrijf?

    De nieuwe cyberregels voor het MKB in aantocht

    Geef een reactie Reactie annuleren

    Je moet ingelogd zijn op om een reactie te plaatsen.

    Awards-inzendingen

    Pijl naar rechts icoon

    Vierstroom Verpleeg Thuis

    Optimale roostering Vierstroom Verpleeg Thuis via AI-applicatie 'Harry'
    Pijl naar rechts icoon

    SPIE Nederland

    SPIE SKD: Innovatieve grip op certificering en operationele inzet
    Pijl naar rechts icoon

    KPN

    Altijd beschikbare zorg-IT (KPN, IT&Care onderdeel van HumanTotalCare)
    Pijl naar rechts icoon

    Cegeka

    Van handmatig naar intelligent: AI‑automatisering bij NIBC
    Pijl naar rechts icoon

    Office EU

    Office EU: Alles-in-1 Office Software Suite, 100% Europees
    Alle inzendingen
    Pijl naar rechts icoon

    Populaire berichten

    Meer artikelen

    Uitgelicht

    Partnerartikel
    Data & AI

    De QR-code als strategische sleutel vo...

    Productdata speelt een belangrijke rol binnen productieketens. Consumenten verwachten transparantie en ketenpartners vragen om betrouwbare informatie. En ook wet- en regelgeving stelt steeds hogere eisen aan de beschikbaarheid en kwaliteit...

    Meer persberichten

    Meer lezen

    deal ceo
    Cloud & Infrastructuur

    Als eerste lokale Benelux-partner officieel erkend door Anthropic

    Security & Awareness

    Kort: Kabinet moet zich wapenen tegen ai-cyberaanvallen, ‘stroopwafel-succes’ DNA Services (en meer)

    Innovatie & Transformatie

    Microsoft onthult netwerktechnieken die datacenters zuiniger maken

    Cloud & Infrastructuur

    Eerenberg (Financiën) houdt vast aan belastingdeal met Fast Enterprises

    Cloud & Infrastructuur

    Kort: Mastercard verleidt fin­tech­star­tups, Vertiv en Nvidia tillen ai-fabriek omhoog (en meer)

    Cloud & Infrastructuur

    Ook (eveneens Amerikaanse) Equinix kan dienst­ver­le­ning DigiD verstoren

    ...

    Footer

    Direct naar

    • Carrièretests
    • Kennisbank
    • Computable Awards
    • Magazine
    • Ontvang Computable e-Magazine
    • Cybersec e-Magazine
    • Topics
    • Phishing
    • Ransomware
    • NEN 7510

    Producten

    • Adverteren en meer…
    • Jouw Producten en Bedrijfsprofiel
    • Whitepapers & Leads
    • Vacatures & Employer Branding
    • Persberichten

    Contact

    • Colofon
    • Computable en de AVG
    • Service & contact
    • Inschrijven nieuwsbrief
    • Inlog

    Social

    • Facebook
    • X
    • LinkedIn
    • YouTube
    • Instagram
    © 2026 Jaarbeurs
    • Disclaimer
    • Gebruikersvoorwaarden
    • Privacy statement
    Computable.nl is een product van Jaarbeurs