The attack on Pearl Harbor is an important lesson in how fragile security can be. While there has been much debate among armchair military enthusiasts and historians about what the American armed forces could or should have done on that day, one thing's for certain. Everyone, at the time, was pretty much operating by the book. They were following policy and doing their jobs as best they could.
Security testing should never be treated lightly or as a matter of routine. There are vital elements that must be addressed if an application is to be as secure as possible. While it’s important to test for common vulnerabilities, there are certain practices that can reveal uncommon ones as well.
IT, like any other human invention, is a two edged sword. It can be used to help or harm. Digital technology will have a major influence on the future and will determine the shape of our society in the days to come. The principal enablers of digital technology are government, business, education and the public. IT spreads as these different sectors of society foster each other. However, these enablers can also move IT in dangerous and destructive directions, as well.