This paper discusses a framework for conduct of information security trend analyses. While several organizations are performing such analyses, there is wide disparity between the level of the analyses, the applicability of results, and the assumptions involved in properly interpreting the results. The framework offers a common ground in which these issues may be resolved. An example analysis process is presented in the paper. The paper includes a discussion of cautionary factors in the application of this framework.
The amazing growth of the Internet, both in size and in influence on our society has lead to increased risks of its exploitation by criminal and terrorist groups. As of now, this exploitation has been relatively limited, at least with respect to the likely activity in the years to come. There is a need to act now to develop and put into place intelligence methodologies to aid analysis of Internet-based national security and criminal threats and to augment existing Internet security practices. These methodologies cannot be a purely technically based, or the true societal significant of Internet activity will be overlooked. They cannot be a purely localized activity, or the divergent needs of various regions and organizations will not be represented. They cannot be simply responsive to incidents, such as viruses or system attacks, or the advantage will remain with the intruders. They cannot be centrally controlled or performed, or the need for rapid `Internet- speed' response will not be met. Internet security threats are distributed, ongoing and multifaceted, so the strategy for dealing with them must be distributed ongoing and multifaceted.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.