Security of the Internet
December 1996 • Special Report
This report describes the status of cybersecurity in 1996.
It is remarkably easy to gain unauthorized access to information in an insecure networked envi-ronment, and it is hard to catch the intruders. Even if users have nothing stored on their computer that they consider important, that computer can be a "weak link", allowing unauthorized access to the organization's systems and information.
Seemingly innocuous information can expose a computer system to compromise. Information that intruders find useful includes which hardware and software are being used, system configuration, type of network connections, phone numbers, and access and authentication procedures. Security-related information can enable unauthorized individuals to get access to important files and pro-grams, thus compromising the security of the system. Examples of important information are passwords, access control files and keys, personnel information, and encryption algorithms.
Judging from CERT® Coordination Center (CERT/CC) data and the computer abuse reported in the media, no one on the Internet is immune. Those affected include banks and financial compa-nies, insurance companies, brokerage houses, consultants, government contractors, government agencies, hospitals and medical laboratories, network service providers, utility companies, the tex-tile business, universities, and wholesale and retail trades.