Difference between revisions of "Scenario 3: "9/12""

From ScenarioThinking
Jump to navigation Jump to search
Line 1: Line 1:
<b>Scenario 3: 9/12 </b><br>
<b>Scenario 3: 9/12 </b><br>


In late 2006 a powerful computer virus is launched in the financial sector and all transactions halt and information is lost.  Backup files in remote locations are available but the virus makes uploading the new data difficult.  Billions of dollars vanish off of balance sheets.  The panic in the US spread around the world within minutes.  All economies are in instant turmoil.  A global recession hits.  The virus has spread through all computers using Microsoft Windows and quickly spread across the US and in some parts around the world.  Internet users are requested to stop using the internet for some time to stop the spread.  The US is able to contain the virus but the impact of the attack is immeasurable.  Consumers and businesses alike become fearful of using the internet. <br>
In late 2006 a powerful computer virus is launched in the financial sector and all transactions halt and information is lost.  Backup files in remote locations are available but the virus makes uploading the new data difficult.  Billions of dollars vanish off of balance sheets.  The panic in the US spread around the world within minutes.  The US government's Computer Emergency Readiness Team (CERT), an arm of the National Cyber Security Division (NCSD)of the Department of Homeland Security (DHS) immediately declares a cyber-alert.  All economies are in instant turmoil.  A global recession hits.  The virus has spread through all computers using Microsoft Windows and quickly spread across the US and in some parts around the world.  Internet users are requested to stop using the internet for some time to stop the spread.  The US is able to contain the virus but the impact of the attack is immeasurable.  Consumers and businesses alike become fearful of using the internet. <br>


The US government creates an official department under the DHS called the Division of Cyber Security (DCS).  They immediately create policies that require all commercial businesses to only use closed source software that has been “officially” screened and “DCS-approved.”  The DCS regulations also only allows transactions between computers that have the DCS-approved software installed.  Consumers who want to conduct transactions online with commercial businesses must download a free version of the DCS-approved software before proceeding.  Security of the internet becomes of the utmost importance.  Individuals are also warned to install DCS anti-virus software but are not legally required to do so.  Hackers are hired to track down security threats.  The EU takes the opportunity to demand that the internet control be handed over to the UN instead of the US.  <br>
NCSD immediately create policies that require all commercial businesses to only use closed source software that has been “officially” screened and “CERT-approved.”  The NCSD regulations also only allows transactions between computers that have the NCSD-approved software installed.  Consumers who want to conduct transactions online with commercial businesses must download a free version of the NCSD-approved software before proceeding.  Security of the internet becomes of the utmost importance.  Individuals are also warned to install NCSD anti-virus software but are not legally required to do so.  Hackers are hired to track down security threats.  The EU takes the opportunity to demand that the internet control be handed over to the UN instead of the US.  <br>


The financial sector rebuilds and slowly begins to recover from the disaster but the DCS software requirement takes a toll on businesses and the US economy.  Consumers without DCS-approved software are unable to conduct any kind of transactions online.  A small group of backlashers try to revolt and create their own network of websites created through open source software.  Proprietary software companies have had to raise prices because they must go through extensive testing and get licenses through the DCS in order to sell their software.    Businesses struggle because complying with new regulations is expensive and software prices have shot through the roof.  Although regular consumers can still buy non-DCS licensed software, the market is slow because consumers are fearful of the consequences.  Consumers stop using their credit cards to purchase online and companies that rely only on the internet for transactions go bankrupt. <br>
The financial sector rebuilds and slowly begins to recover from the disaster but the NCSD software requirement takes a toll on businesses and the US economy.  Consumers without CERT-approved software are unable to conduct any kind of transactions online.  A small group of backlashers try to revolt and create their own network of websites created through open source software.  Proprietary software companies have had to raise prices because they must go through extensive testing and get licenses through the NCSD in order to sell their software.    Businesses struggle because complying with new regulations is expensive and software prices have shot through the roof.  Although regular consumers can still buy non-NCSD licensed software, the market is slow because consumers are fearful of the consequences.  Consumers stop using their credit cards to purchase online and companies that rely only on the internet for transactions go bankrupt. <br>


On the other hand, the software services industry booms because companies need professional assistance in order to ensure that they are complying with DCS’s regulations.  A market opens for DCS regulation professionals.  All software developers focus on security as the driving force of operations.  Closed source and high security software dominates.  Single-device software developers and web-service based applications that had previously enjoyed prosperity and were seemingly going to be the "new thing" have had to slow down and revamp their scecurity.  Security software developers innovate rapidly and the market for high-security software grows. Open source software tries to re-emerge, but the "secured software" developers are running powerful campaign on threats of internet. Fear controls the crowds, thus the development of the web 2.0 platform stagnates.  <br>   
On the other hand, the software services industry booms because companies need professional assistance in order to ensure that they are complying with NCSD’s regulations.  A market opens for NCSD regulation professionals.  All software developers focus on security as the driving force of operations.  Closed source and high security software dominates.  Single-device software developers and web-service based applications that had previously enjoyed prosperity and were seemingly going to be the "new thing" have had to slow down and revamp their scecurity.  Security software developers innovate rapidly and the market for high-security software grows. Open source software tries to re-emerge, but the "secured software" developers are running powerful campaign on threats of internet. Fear controls the crowds, thus the development of the web 2.0 platform stagnates.  <br>   


Microsoft develops a new operating system but consumers are skeptical and fearful.  Microsoft loses significant market share and opens opportunities for smaller operating software companies to enter the market.  This drives innovation but the high regulation counters the drive.  <br>
Microsoft develops a new operating system but consumers are skeptical and fearful.  Microsoft loses significant market share and opens opportunities for smaller operating software companies to enter the market.  This drives innovation but the high regulation counters the drive.  <br>

Revision as of 15:59, 7 June 2006

Scenario 3: 9/12

In late 2006 a powerful computer virus is launched in the financial sector and all transactions halt and information is lost. Backup files in remote locations are available but the virus makes uploading the new data difficult. Billions of dollars vanish off of balance sheets. The panic in the US spread around the world within minutes. The US government's Computer Emergency Readiness Team (CERT), an arm of the National Cyber Security Division (NCSD)of the Department of Homeland Security (DHS) immediately declares a cyber-alert. All economies are in instant turmoil. A global recession hits. The virus has spread through all computers using Microsoft Windows and quickly spread across the US and in some parts around the world. Internet users are requested to stop using the internet for some time to stop the spread. The US is able to contain the virus but the impact of the attack is immeasurable. Consumers and businesses alike become fearful of using the internet.

NCSD immediately create policies that require all commercial businesses to only use closed source software that has been “officially” screened and “CERT-approved.” The NCSD regulations also only allows transactions between computers that have the NCSD-approved software installed. Consumers who want to conduct transactions online with commercial businesses must download a free version of the NCSD-approved software before proceeding. Security of the internet becomes of the utmost importance. Individuals are also warned to install NCSD anti-virus software but are not legally required to do so. Hackers are hired to track down security threats. The EU takes the opportunity to demand that the internet control be handed over to the UN instead of the US.

The financial sector rebuilds and slowly begins to recover from the disaster but the NCSD software requirement takes a toll on businesses and the US economy. Consumers without CERT-approved software are unable to conduct any kind of transactions online. A small group of backlashers try to revolt and create their own network of websites created through open source software. Proprietary software companies have had to raise prices because they must go through extensive testing and get licenses through the NCSD in order to sell their software. Businesses struggle because complying with new regulations is expensive and software prices have shot through the roof. Although regular consumers can still buy non-NCSD licensed software, the market is slow because consumers are fearful of the consequences. Consumers stop using their credit cards to purchase online and companies that rely only on the internet for transactions go bankrupt.

On the other hand, the software services industry booms because companies need professional assistance in order to ensure that they are complying with NCSD’s regulations. A market opens for NCSD regulation professionals. All software developers focus on security as the driving force of operations. Closed source and high security software dominates. Single-device software developers and web-service based applications that had previously enjoyed prosperity and were seemingly going to be the "new thing" have had to slow down and revamp their scecurity. Security software developers innovate rapidly and the market for high-security software grows. Open source software tries to re-emerge, but the "secured software" developers are running powerful campaign on threats of internet. Fear controls the crowds, thus the development of the web 2.0 platform stagnates.

Microsoft develops a new operating system but consumers are skeptical and fearful. Microsoft loses significant market share and opens opportunities for smaller operating software companies to enter the market. This drives innovation but the high regulation counters the drive.

Eventually the world slowly recovers from the recession. Advancements in technology spur innovation and open source slowly emerges again. With rapid advancements in technology, self-generating software takes the lead and innovations in powerful anti-virus software ease security worries.


Return