Having protection from one’s adversaries, particularly from those who would do harm—intentionally, or otherwise, to property or to a person. Information Technology security issues include but are not limited to authentication, critical infrastructure protection, disaster recovery, intrusion detection and network management, malicious code software protection, physical security of networks, security policies, the sharing of rights and directories, and wireless security.
Security breaches occur daily, with some of them making media headlines and embarrassing the targeted companies or agencies. On January 30, 2005, for example, a security incident occurred that brought considerable embarrassment to the Dutch armed forces. About 75 pages of highly classified documents about human traffickers from the computers of the Dutch Royal Marechaussee (the armed forces contingency that guards the Dutch borders) somehow found their way to the controversial weblog Geen Stijl (meaning “No Style”).
The conjecture is that a Dutch armed forces staffer worked on the documents at home and unwittingly shared the contents of his computer’s hard drive to numerous others when he logged onto KaZaA—which is unsecure.
This was not the first time that the Dutch have made media headlines over computer security issues. In 2004, the Dutch public prosecutor’s office was equally embarrassed after it was publicized that the prosecutor threw his old PC into the trash, making available for public scrutiny his hard drive with hundreds of pages of classified data on high-profile Dutch crimes—as well as his own credit card numbers and personal tax file information. As a result, the prosecutor resigned from his job.
Estala, A. Internet Protocol Version 6 (IPv6). The Next Generation. [Online, March 9, 1999.] Geocities.com Website. http://www.geocities.com/SiliconValley/ Foothills/7626/defin.html; Grami, A. and Schell, B. Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security Challenges. Proceedings of Second Annual Conference on Privacy, Security and Trust. University of New Brunswick, New Brunswick, Canada, October 13–15, 2004. [Online, October 2004.] Privacy, Security, Trust 2004 Website. http:// www.unb.ca/pstnet/pst2004/; Lehtovirta, J. Transition from IPv4 to IPv6. [Online, 2004.] Tascomm Engineering Oy Website. http://www.tascomm.fi/~jlv/ngtrans/; Libbenga, J. Classified Dutch Military Documents Found on P2P Site. [Online, January 30, 2005.] Reg SETI Group Website. http://www.theregister.co.uk/2005/01/30/dutch_classified_info_found_on_kazaa/.