Close relationships in cyberspace, as in real life, can make either partner more vulnerable. A relationship, solely by virtue of the value it brings to its partners, may be attacked by competitors of each. Third parties can exploit weaknesses in one to get at others. More insidiously but, fortunately, less commonly, one partner may exploit the relationship to wend its way into – and from that vantage point, to assault – the systems of partners.
Love and war, so famously mated in fiction, find echo in cyberspace. Here one asks: by what means, and with what effect?
Do the Walls Really Come Down?
Two organizations that would exchange information on a continual basis can most seamlessly do so by merging their respective systems, thereby creating a common cyberspace so that members of one gain full access to the resources, data, and applications of the other.
Yet, with all the risks of intimacy that arise from unprotected networking, are enterprises so likely to lower their barriers entirely? Furthermore, is it that necessary? After all, internal barriers are routine even within single organizations. Rightly or wrongly, many organizations maintain a hierarchy of privilege with respect to seeing information. Others adopt compartmentation in the belief that any sufficiently interesting piece of information known to enough people within an organization is bound to be known to the wrong person outside of it. Similarly, any corruptible systems process accessible to enough people on the inside will eventually become corrupted.