The final myth is the one that leads to the most pronounced false sense ofsecurity - that my make ofcomputer or operating system is not vulnerable to security problems.
After confirming the breach, the Chamber shut down and destroyed parts of its computer network, proceeding to revamp its securitysystem over a 36-hour period.
The courts have yet to decide who is liable if a computersystem with lax security is used to launch a denial-of-service attack, but a number of lawsuits are pending.
The once vaunted IRS computersystem has trouble accomplishing what would seem to be the most basic of functions: reconciling Social Security numbers, W-2 forms and even the number of children in a household.