http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/clarke.html
August 12, 2003
Worm Blasts Windows Users Worldwide
By Mark Berniker
Internetnews.com
The 'Blaster' worm, also referred to as the 'Lovesan' or 'MSBlaster' worm, takes advantage of a vulnerability in Microsoft's Windows Distributed Component Object Model (DCOM) Remote Procedure Call (RPC) interface, widely publicized in July as the first 'critical' vulnerability in Microsoft's new Windows Server 2003 operating system, though it also affects Windows NT 4.0, Windows NT 4.0 Terminal Services Edition, Windows 2000, and Windows XP.
http://www.internetnews.com/dev-news/article.php/2247801
So a lot of system administrators, rather than go through all of that, not knowing what's going on in their own system, just don't apply the patches, or they take months to apply the patches. What we saw with the Sapphire worm, or we saw with Nimda, or we saw with Code Red, was that the vulnerability had been identified, the patch had been issued. But people hadn't bothered to put it on, because it's just too cumbersome, too hard to do, and you don't know what effect it's going to have on other pieces of software.
Right now, our electric power companies, both the generating companies and the distribution companies, have paid very little attention to security in cyberspace
In this one case, I think federal regulation makes sense, because without it, these electric power companies are not going to pay attention to security.
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/clarke.html
Computer
worm wreaks havoc
By DAVID AKIN
>From Thursday's Globe and Mail
Aug 14, 2003
A worm, though, crawls across the Internet automatically, search