{"81891":{"#nid":"81891","#data":{"type":"news","title":"Under Attack: Information Security Battle will Require Computer Users to Make Tough Choices","body":[{"value":"\u003Cp\u003EThen work begins to repair the inevitable damage and limit the financial costs.  There must be a better way.\n\u003C\/p\u003E\n\u003Cp\u003EResearchers at the Georgia Institute of Technology say solving the world\u0027s growing information security problems will demand tough choices involving tradeoffs in cost, convenience and computing performance.  \n\u003C\/p\u003E\n\u003Cp\u003EFor instance, computer users will have to put a priority on security and be prepared to pay for it.  They may have to retain well-tested software rather than install the newest version rushed to market.  And they\u0027ll have to bear the costs of rebuilding worldwide networks on secure foundations.\n\u003C\/p\u003E\n\u003Cp\u003E\u0022Computers are being used more extensively, more widely and in more critical applications. They are a part of our lives today. They will be even more a part of our lives in the future,\u0022 says Ralph Merkle, director of the Georgia Tech Information Security Center (GTISC). \u0022And for the past couple of decades we have put up with buggy code, unreliable computers, insecure computers, and computers that are vulnerable to viruses, worms, spam and other problems. All of this has to change. We need to have reliable computers, systems and networks that we can trust.\u0022\n\u003C\/p\u003E\n\u003Cp\u003EFrom individual users to network administrators to senior government and industry officials, interest in information security is capturing people\u0027s attention. GTISC researchers and others are now hopeful that consumer demand will boost efforts to solve myriad issues in the field.\n\u003C\/p\u003E\n\u003Cp\u003E\u0022Information security is not just a technological problem,\u0022 says Professor of Computing Mustaque Ahamad, the GTISC co-director of technology. \u0022There\u0027s a lot more to it. It\u0027s a complex problem, and its solutions will require new technology, policy, awareness and education. We\u0027re looking at the whole problem.\u0022\n\u003C\/p\u003E\n\u003Cp\u003EThough the task is daunting, the world\u0027s information security problems can be solved, Merkle confidently predicts. Because these issues have been resolved in special applications, such as aircraft navigation and national defense, researchers know it can be done for computer systems everywhere. Merkle concedes, however, that producing such secure software will be costly in dollars, time and, perhaps, convenience, as well.\n\u003C\/p\u003E\n\u003Cp\u003ECosts in dollars and time will mount as programmers rewrite a lot of computer code, as researchers build new systems with security as a basic component, and then as individuals and organizations have to update or replace insecure systems, Merkle explains.  \n\u003C\/p\u003E\n\u003Cp\u003E\u0022It will take fundamental changes in how we deal with computer software development, which will require fundamental changes in our use of secure systems,\u0022 Merkle says. \u0022We will have to rethink a lot of the basic approaches that have been used.\u0022\n\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"Whenever a new virus begins flooding the world\u0027s computer networks, individual users rush to download the latest anti-virus updates while network administrators hastily apply the latest patches to vulnerable equipment.","format":"limited_html"}],"field_summary_sentence":"","uid":"27304","created_gmt":"2004-03-24 01:00:00","changed_gmt":"2016-10-08 03:03:38","author":"Matthew Nagel","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2004-03-24T00:00:00-05:00","iso_date":"2004-03-24T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"related_links":[{"url":"http:\/\/gtresearchnews.gatech.edu\/newsrelease\/gtisc.htm","title":"Tradeoffs required"}],"groups":[{"id":"1188","name":"Research Horizons"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cstrong\u003E \u003C\/strong\u003E\u003Cbr \/\u003E\u003Ca href=\u0022http:\/\/www.gatech.edu\/contact\/index.html?id=\u0022\u003EContact  \u003C\/a\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}