The Changing Role of IT Security in an Internet World. A Business Perspective (and a request for help) Hannes Lubich Bank Julius Baer, Zurich. Outline. IT Security Properties and Threats IT Security Building Blocks, Shortcomings and Further Research Requirements
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
The Changing Role of IT Security in an Internet World
A Business Perspective
(and a request for help)
Bank Julius Baer, Zurich
Operation and reputation of the firmas a whole
Government and private intelligence community
„Internal“ treats (dishonest employees, software failures etc.)
Business partners(customers,outsourcers, competitors,suppliers, etc.)
Hackers, pranksters,investigativereporters etc.
Source: Cylink Document "The Need for Information Security"
Source: Icove/Seger/Von Storch, Computer Crime, O‘Reilly, 1995, p. 22
Type of Attacker
Budget for Computer
Time to Break 40-bit Key
Time to Break 56-bit Key
Time to Break 64-bit Key
Time to Break 128-bit Key
Hacker Using Spare Cycles
Big Companyor Internet
Source: Blaze, Rivest, Diffie, Schneier, Shimomura, Thompson, Wiener; “Minimal Key Lengths for
Symmetric Cyphers, A Report By An Ad-Hoc Group of Cryptographers And Computer Scientists”