2007: The end of computing culture as we know it?
London, UK - 1 March 2005, 09:00 GMT - The latest digital risk data
from the mi2g Intelligence Unit shows that, within the coming two years,
homes and Small to Medium size Enterprises (SMEs) may be unable to protect
themselves from the relentless rise in spam, sophisticated viruses and worms,
spyware, manual and automated digital attacks, complex phishing scams, denial
of service incidents and zombie harvesting techniques deployed to create elaborate
botnets - networks of compromised machines used for nefarious purposes.
The standard compendium of anti-virus tool kit, firewall and patch regime
is unlikely to prove adequate especially for those SME organisations and individuals
that can ill afford specialist security expertise for their 24/7 broadband
online and wireless connection. Governments and regulators may have to intervene
to protect their citizens and SMEs from trans-national radicals, organised
criminals and espionage technology as the economic impact of digital risk
becomes severe and damages GDP growth by several percentage points. So far,
nations have noted productivity gains from computing. The inverse may also
become true, detrimental productivity losses as a direct result of large scale
digital risk manifestations may occur post 2007.
Large corporations and government departments will not be able to stand away
from this rising threat as their customers and suppliers come under sustained
digital attack, curtail their online transactions and are unable to meet their
obligations. The Achilles heel in the digital eco-system is the home and SME
user-base and this is the weakness being exploited by organised criminals,
radicals and spies. If those vulnerable machines have been compromised and
turned into zombies, the resultant botnets can be used to launch an elaborate
Distributed Denial of Service (DDoS) attack against any government department,
large corporation or nation state. Once a large botnet based within a country's
'homes and SMEs' sectors has been clandestinely created, even if the national
or regional internet connections are severed to stop a large scale attack,
there will be no impact because the botnet "Trojan Horse" will continue
to attack the larger entities from within.
Most homes and some SMEs are unaware that their standard security systems
and regime will not always protect them from:
1. Spam, which is routinely laden with malware - Trojans, viruses and worms;
2. Sophisticated viruses and worms, which may attack systems prior to the
availability of the latest upgrade from the security or software vendor and
the solution may lie in shutting the vulnerable ports or applications off
in the interim;
3. Software application and operating system vulnerabilities that do not have
a patch available until much later sometimes. Automated as well as manual
attacks may be directed against those targets in the interim if other counter-measures
are not in place;
4. Phishing scams and online identity theft via Trojans or spyware, which
may not be controllable because the present regime of online authentication
via a password and keyword utilised by most banks or simple credit card entry
utilised by online merchants is proving to be woefully inadequate. Unless
there is a migration to biometric authentication (eg iris, voice or thumb
print scan), coupled with a keyfob or physical device authentication and a
password, the sophisticated digital crimes may not be controllable; and
5. Machine hijacks, where computers have been converted into zombies to become
mail relay farms, launch DDoS attacks and carry out other nefarious activities
like hosting child pornography or an illegal peer-to-peer music download server.
The global economic damage from all types of digital risk including overt
and covert digital attacks, malware incidence, phishing scams, DDoS and spam
lies between USD 470 billion and USD 578 billion for 2004, more than double
the damage calculated for 2003 by the mi2g Intelligence Unit. [Breakdown
damages are available.] At an estimated 1.2 billion computer units worldwide,
the damage per machine lies between USD 390 and USD 480 per machine. As of
2004, the damage caused by digital risk manifestations per machine is running
equivalent to the average price of a new computer unit. In 2005 and 2006,
the 'digital damage per machine' figure is projected to exceed the price of
the machine significantly as the price of computers keeps coming down and
the damage from digital risk carries on rising.
"Banks are already beginning to shy away from their responsibility to
compensate users in the event of an online fraud where they have issued warnings
and the incapability of the user is to blame." said DK
Matai, Executive Chairman, mi2g. "The
present computing environment is not fool-proof and is not safe enough for
the average computer user who is not a geek or does not have a friend who
is a geek. This era is likely to come to an end with a bang. Users and governments
will demand change and they have the collective power to influence the thinking
of computing and communications vendors who have consistently put profits
and time-to-market before safety and security."
Digital risk damages are calculated by the mi2g Intelligence Unit on
the basis of helpdesk support costs, overtime payments, contingency outsourcing,
loss of business, bandwidth clogging, productivity erosion, management time
reallocation, cost of recovery and software upgrades. When available, Intellectual
Property Rights (IPR) violations as well as customer and supplier liability
costs have also been included in the estimates.
[ENDS]
mi2g is at the leading edge of building secure on-line banking, broking
and trading architectures. The principal applications of our technology are:
1. D2-Banking;
2. Digital Risk Management; and
3. Bespoke Security Architecture.
mi2g pioneers enterprise-wide security practices and technology to
save time and cut cost. We enhance comparative advantage within financial
services and government agencies. Our real time intelligence is deployed worldwide
for contingency capability, executive decision making and strategic threat
assessment.
mi2g Research Methodology: The Frequently Asked Questions (FAQ) List
is available from here in pdf. Please
note terms and conditions of use listed on
www.mi2g.net
Full details of the February 2005 report are available as of 1st March 2005
and can be ordered from here.
(To view contents sample please click here).