IDEAS home Printed from https://ideas.repec.org/h/spr/mgmchp/978-3-319-46529-6_6.html
   My bibliography  Save this book chapter

IT Security: Stronger Together

In: Cyber Security. Simply. Make it Happen

Author

Listed:
  • Ralf Schneider

    (Allianz SE)

Abstract

Modern CIOs handle a multitude of roles within their companies, from deciding the strategic orientation of the IT environment to keeping data centers and devices running smoothly. As if this wasn’t enough in terms of responsibility, CIOs also bear ultimate responsibility for the security of data, applications and the IT infrastructure. Although ensuring the safety of the company’s digital assets has long been one of the core elements of a security strategy, new adversaries such as government-backed hacker groups, cyberespionage teams out for a quick profit and politically motivated activists have resulted in a “red alert” status for digital assets. And yet, while the current threat from these numerous attack vectors should be taken deadly seriously, many companies still believe that antivirus software, a firewall or simply taking a hush-hush approach are adequate precautionary measures. Antivirus software and firewalls are of course essential, even though both systems only form building blocks of an overall security model. But the time has really come to drop the idea of seeing security as a taboo topic not to be discussed in public. “Security by obfuscation” used to be considered a legitimate security strategy: If we don’t publish any information on a topic, then we’re not giving away any useful data—right? Wrong! Pretty much every proprietary software or hardware has now been hacked, simply because attackers found a loophole that manufacturers had overlooked. Which is why open source software is considered more secure: The multitude of auditors and developers picking through the code maximizes the number of vulnerabilities detected and the speed of their discovery. Going at it alone, hidden away behind closed doors, is not how IT security works. Attackers recognized this a long time ago, of course. Since hacking is a collaborative, team-based effort, why shouldn’t the good guys do the same?

Suggested Citation

  • Ralf Schneider, 2017. "IT Security: Stronger Together," Management for Professionals, in: Ferri Abolhassan (ed.), Cyber Security. Simply. Make it Happen, chapter 6, pages 47-57, Springer.
  • Handle: RePEc:spr:mgmchp:978-3-319-46529-6_6
    DOI: 10.1007/978-3-319-46529-6_6
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a search for a similarly titled item that would be available.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:mgmchp:978-3-319-46529-6_6. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.