ABSTRACT

New technologies that create new (and possibly easier)

ways to penetrate a system invite such professionals and

fail to deter the amateurs.

This entry describes some of the potential threats to

information security that may arise in the next few years.

The entry concludes by pointing out the opportunities for

employing new countermeasures.