of information systems and networks and what they can do to enhance security, they also should be aware of the potential harm to others arising from interconnectivity and interdependency.
Responsibility: all participants, including policymakers and program designers, are responsible for the security of information systems and networks.
Response: Participants should act in a timely and coope
of per processor licenses has increased."
② 1995–2005: Internet and the 32-bit era
Following Bill Gates's internal "Internet Tidal Wave memo" on May 26, 1995 Microsoft began to redefine its offerings and expand its product line into computer networking and the World Wide Web.[ The company released Windows 95 on August 24, 1995, featuring pre-emptive multitasking, a completely new user
billion) by 2014
- Wiretapping, Infiltration, etc
2) software piracy
The copyright infringement of software (often referred to as software piracy) refers to several practices which involve the unauthorized copying of computer software. Copyright infringement of this kind is extremely common. Most countries have copyright laws which apply to software, but the degree of enforcement varies.
Power 권력
The capacity that A has to influence the behavior of B so that B acts in accordance with A’s wishes A의 능력으로 B의 행동에 영향을 미쳐 A가 원하는데로 B가 반응한다
Exists as a potential or fully actualized influence over a dependent relationship 의존 관계에 가능성 혹은 완전히 현실화된 영향으로 존재
Depe
Recent Situation
“ internal information security attacks are outgrowing external
attacks at the world’s largest financial institutions”
(The Global Security Survey): Only 20% of the respondents in security survey strongly
believed that Information security should be a CEO-level priority
Ernst and Young(2004)
2) IT liability risk management
: The corporations should install f