Chapter 48 – |
Y2K: Lessons Learned for Computer Security |
Tim Braithwaite
Chapter Contents:
|
48.1 |
|
Looking Back
|
|
48.2 |
|
Y2K: The Accusation and a Detailed Rebuttal
|
|
48.2.1 |
|
The Allegation
|
|
48.2.2 |
|
The Allegation and the Human Element
|
|
48.3 |
|
Looking Ahead
|
|
48.3.1 |
|
Y2K Was Really a Computer Security Issue
|
|
48.3.2 |
|
Critical Infrastructure Protection
|
|
48.3.3 |
|
Y2K Lessons Learned
|
|
48.3.3.1 |
|
Lesson 1: Information and Process Integrity Are Now Believed by Management to be Important to the Business
|
|
48.3.3.2 |
|
Lesson 2: "Supply Chain" Collaboration for Achieving Mutually Assured Information and Process Integrity Is Now Better Appreciated
|
|
48.3.3.3 |
|
Lesson 3: Information and Computer Processes Are Important Corporate Assets that Need to Be Rigorously Managed
|
|
48.3.3.4 |
|
Lesson 4: Y2K Demonstrated that Existing Technical Infrastructure Management Was Poor
|
|
48.3.3.5 |
|
Lesson 5: Risk Management Must Become a Way of Life
|
|
48.3.3.6 |
|
Lesson 6: Automated Business Environments Must Be Monitored Continually for New Vulnerabilities, and Their Protection Improved
|
|
48.3.3.7 |
|
Lesson 7: Y2K Became a Due Diligence Issue for the Board and So Will Computer Security
|
|
48.4 |
|
Making Computer Security an Issue for the Board of Directors
|
|
48.5 |
|
Thirteen Steps for Board Oversight
|
|
48.6 |
|
Challenges to be Overcome
|
|
48.7 |
|
Critical Infrastructure Protection Issues That Need Resolution
|
|
48.8 |
|
Conclusion
|
|
48.9 |
|
Notes
|
|
|
|