Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?

  • Ahto BuldasEmail author
  • Märt Saarepera
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10292)


During the last decades, we have witnessed an explosive growth of computer-technology and the Internet. Due to the growing role of computers and Internet in important business and state-related activities, investments to computer security and the security industry have also been growing fast. In spite of that, we also see the growing trend of cyber crime and losses due to security incidents. We predict that these three growing trends will continue in the future the main reasons being that: (1) as more and more assets will be connected to the Internet, the number of potential targets and stimuli for attackers grow; (2) fundamental (and hard to change) design decisions made in early development stages of todays Internet- and computer technology guarantee persistent technical vulnerabilities in Internet-based systems due to which attackers will always be one step ahead of defenders; (3) growing role of Chief Security Officers (CSOs) in organisations, who do not necessarily have to understand the detailed purpose and functionality of the system but whose duty is still to make the ITC system of the organisation secure. These reasons guarantee the continuous growth of the security industry but also the continuous growth of losses through cyber crime.


Computer security Cyber crime System engineering 


  1. 1.
    Baran, P.: Reliable Digital Communications Systems Using Unreliable Network Repeater Nodes. RAND Corporation P-1995 (1960).
  2. 2.
    Baran, P.: On Distributed Communications. RAND Corporation P-2626 (1962).
  3. 3.
    Cherdantseva, Y., Hilton, J.: Information security and information assurance. The discussion about the meaning, scope and goals. In: Almeida, F., Portela, I. (eds.) Organizational, Legal and Technological Dimensions of Information System Administrator, pp. 167–198. IGI Global Publishing, Hershey (2013). Google Scholar
  4. 4.
    Cherdantseva, Y., Hilton, J.: A reference model of information assurance and security. In: Proceedings of ARES 2013, pp. 546–555 (2013). doi: 10.1109/ARES.2013.72
  5. 5.
    War in the fifth domain. Are the mouse and keyboard the new weapons of conflict? Econ., 1 July 2010.
  6. 6.
  7. 7.
  8. 8.
    Herley, C.: The unfalsifiability of security claims. In: Proceedings National Academy of Sciences, May (2016).
  9. 9.
    Nakashima, E.: Stuxnet was work of U.S. and Israeli experts, officials say. The Washington Post, 2 June 2012Google Scholar
  10. 10.
    Caldwell, L.A., Winter, T.: FBI Releases Notes From Interview With Hillary Clinton Over Emails. NBCNews, 3 September 2016.
  11. 11.
    OECD’s Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security. OECD (2002).
  12. 12.
    Parker, D.B.: Fighting Computer Crime. Wiley, New York (1998). ISBN 0-471-16378-3Google Scholar
  13. 13.
    Roberts, L.G.: The evolution of packet switching. Proc. IEEE 66(11), 1307–1313 (1978). CrossRefGoogle Scholar
  14. 14.
    Stoneburner, G., Hayden, C., Feringa, A.: Engineering Principles for Information Technology Security (A Baseline for Achieving Security), Revision A. NIST Special Publication 800–27 Rev A (2004).
  15. 15.
    Traynor, I.: Russia accused of unleashing cyberwar to disable Estonia. Guardian (2007).
  16. 16.
    Internet out hits tourism sector. Myanmar Times, 2 November 2010.

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Tallinn University of TechnologyTallinnEstonia
  2. 2.Cybernetica ASTallinnEstonia
  3. 3.TallinnEstonia

Personalised recommendations