In a world governed by market forces, Western nations are destined to see further of their primary industries and manufacturing base. Anything that can be made in the West can be made cheaper in lesser developed countries (LDC). Our one competitive edge is information technology. We can replace our unprofitable smokestack industries with information-intensive ones; but only if we maintain the credibility of our information technology. This means assuring: 1. (1) Protection of intellectual property. 2. (2) Personal and corporate privacy. 3. (3) Integrity of business data and contracts. 4. (4) Ready availability of service. Credibility can stem only from effective information security; and to achieve it we must overcome at least these five formidable obstacles; 1. (1) Fundamentally flawed computer architecture. 2. (2) Chaotic computer communications networks. 3. (3) Irrelevant national computer security programmes. 4. (4) Persistent mixing of experimentation and application. 5. (5) Freebooting technicians and apathetic managers. We have less than five years to put in place an effective information security programme focused on the private sector before we see our information-intensive industries fly off to join our expatriate steel mills and auto plants; and we are left frying hamburgers for each other.
Read full abstract