ABSTRACT
New technologies that create new (and possibly easier)
ways to penetrate a system invite such professionals and
fail to deter the amateurs.
This entry describes some of the potential threats to
information security that may arise in the next few years.
The entry concludes by pointing out the opportunities for
employing new countermeasures.