| 
                           
                              | 
                                       Peter Tippett
                                          | Chapter 54 – | The Future of Information Security |  
 Chapter Contents:
 
 
 
                                       
                                          |  | 54.1 |  | Risk Equation |  
                                          |  | 54.1.1 |  | Threat |  
                                          |  | 54.1.2 |  | Vulnerability |  
                                          |  | 54.1.3 |  | Cost and Economic Impact |  
                                          |  | 54.1.4 |  | Risk |  
                                          |  | 54.2 |  | Seven Macrotrends in Internet Security |  
                                          |  | 54.2.1 |  | Increasing Complexity Drives Accelerating Growth in Vulnerability |  
                                          |  | 54.2.2 |  | Rapidly Changing Environment Drives Rapidly Changing Risks |  
                                          |  | 54.2.3 |  | Greater All-to-All Connectivity Drives Greater Malicious Connectivity |  
                                          |  | 54.2.4 |  | Growth in Internet Users Drives Growth in Internet Abusers |  
                                          |  | 54.2.5 |  | Internet Anonymity Drives Tendency toward Abuse |  
                                          |  | 52.2.6 |  | "E-Democritization" Drives Greater Power and Access for Abusers |  
                                          |  | 54.2.7 |  | Lack of Accepted Security Processes Drives the Pursuit of Dogma |  
                                          |  | 54.2.7.1 |  | Password Policies |  
                                          |  | 54.2.7.2 |  | Encryption |  
                                          |  | 54.2.8 |  | Five Microtrends in Internet Security |  
                                          |  | 54.3 |  | Dynamic, Holistic Security Process |  
                                          |  | 54.3.1 |  | Strongest Security: Fix Simple Things, and Repeat Often |  
                                          |  | 54.3.2 |  | It Takes Three Mistakes to Kill You |  
                                          |  | 54.3.3 |  | Coping with Malicious Code |  
                                          |  | 54.3.4 |  | Insider Threats |  
                                          |  | 54.3.5 |  | Effective Risk Management |  
                                          |  | 54.4 |  | Envisioning the Future |  
                                          |  | 54.5 |  | Notes |  
 |  | 
                  
                     |  |