Catálogo de publicaciones - libros

Compartir en
redes sociales


Computer Insecurity: Risking the System

Steven Furnell

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Theory of Computation; Management of Computing and Information Systems; Data Encryption

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-1-85233-943-2

ISBN electrónico

978-1-84628-270-6

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag London 2005

Tabla de contenidos

The Problem of Computer Insecurity

Steven Furnell

This chapter has established that security is not a simple problem to solve. Indeed, the requirements to preserve the confidentiality, integrity, and availability of IT systems and data introduce the need for safeguards that go well beyond simply having controls on the computers themselves. Nonetheless, the extent to which we depend upon IT dictates that security cannot be ignored. If systems are not protected, there is plenty that can go wrong, and so it is in our interest to take the matter seriously. Unfortunately, however, it soon becomes apparent that although security may be accepted at a surface level, actually getting organisations and individuals to realise how it applies to them can represent a challenge in its own right. As such, a grudging acceptance is often more likely than whole-hearted commitment.

Pp. 1-15

The Need to Raise Awareness

Steven Furnell

This chapter has given an indication of the range of attacks to which our systems and data may be exposed. Threats such as hacking and malicious software are not going to disappear, and thus represent a persuasive reason for having security. Worms and viruses in particular have become far more problematic in recent years, exploiting new methods to enter our systems, and doing so at dramatically increased speeds via the Internet. The need for a proactive stance on our part is ever more apparent.

The Net is also linked to other opportunities for our data to be attacked or compromised, and the unfortunate fact is that, in some cases, we are left at the mercy of other peoples’ attitudes towards security if we want to use the services that they offer. It, therefore, requires us to at least be careful whom we are dealing with, and ensure that we do not share our sensitive data in a cavalier manner.

Having said all this, it is worth remembering that a major source of problems can also come from within. Although external attack attempts may be greater in volume, it is often the more informed internal attackers and abusers who have the most chance of success, if security is not there to stop them.

Pp. 17-39

Common Failings That Compromise Security

Steven Furnell

Whether we like it or not, certain aspects of IT security are beyond our direct control, and there will always be a degree of reliance upon other parties to take care of some things on our behalf. However, this need not be a problem, as long as we have realistic expectations of what can be relied upon, and do not assume protection by default. For example, while we must always hope that software vendors and service providers will try their best to give us secure and reliable systems, there is ample evidence to show that problems can still occur. So, although there are many scenarios in which we can expect to rely upon others, we should not be doing so blindly.

Of course, external parties can be more than just a source of problems. There are also people that we can turn to for help—both in terms of addressing security, and when something goes wrong. Here again, however, it is important to make sure that we are placing faith in the right hands. IT security responsibilities should not be entrusted lightly, and if external help is to be considered, it makes sense to ensure that appropriate and credible skills are on offer. As such, having an understanding of the practical distinctions between different security qualifications and certifications can improve the chances of getting someone who can do the job that we want.

Pp. 41-72

The Widespread Nature of Vulnerability

Steven Furnell

IT security is everyone’s problem. None of the victims described in this chapter was uniquely prone to the breaches they suffered, and although some systems may be more susceptible than others, nobody can consider themselves immune. In many cases we need to re-evaluate the factors that we perceive to make us vulnerable. The discussion has clearly shown that breaches are not the exclusive preserve of large organisations and that the reasons we might find our systems being targeted are not necessarily those that we first expected. In addition, we need to be realistic about what we are protecting against. If we consider deliberate attacks to be the only threat, then we are likely to overlook accidental incidents that could be equally damaging.

The discussion has again shown that there is no such thing as 100% security and that no matter how much attention is devoted to it, the problem can never be considered solved once and for all. As such, a realistic strategy is about managing and reducing risk, rather than removing it altogether.

Pp. 73-103

Attack and Exploitation of Systems

Steven Furnell

This chapter has given an indication of the range of attacks to which our systems and data may be exposed. Threats such as hacking and malicious software are not going to disappear, and thus represent a persuasive reason for having security. Worms and viruses in particular have become far more problematic in recent years, exploiting new methods to enter our systems, and doing so at dramatically increased speeds via the Internet. The need for a proactive stance on our part is ever more apparent.

The Net is also linked to other opportunities for our data to be attacked or compromised, and the unfortunate fact is that, in some cases, we are left at the mercy of other peoples’ attitudes towards security if we want to use the services that they offer. It, therefore, requires us to at least be careful whom we are dealing with, and ensure that we do not share our sensitive data in a cavalier manner.

Having said all this, it is worth remembering that a major source of problems can also come from within. Although external attack attempts may be greater in volume, it is often the more informed internal attackers and abusers who have the most chance of success, if security is not there to stop them.

Pp. 105-145

External Influences and Dependencies

Steven Furnell

Whether we like it or not, certain aspects of IT security are beyond our direct control, and there will always be a degree of reliance upon other parties to take care of some things on our behalf. However, this need not be a problem, as long as we have realistic expectations of what can be relied upon, and do not assume protection by default. For example, while we must always hope that software vendors and service providers will try their best to give us secure and reliable systems, there is ample evidence to show that problems can still occur. So, although there are many scenarios in which we can expect to rely upon others, we should not be doing so blindly.

Of course, external parties can be more than just a source of problems. There are also people that we can turn to for help—both in terms of addressing security, and when something goes wrong. Here again, however, it is important to make sure that we are placing faith in the right hands. IT security responsibilities should not be entrusted lightly, and if external help is to be considered, it makes sense to ensure that appropriate and credible skills are on offer. As such, having an understanding of the practical distinctions between different security qualifications and certifications can improve the chances of getting someone who can do the job that we want.

Pp. 147-178

Insecurity: Here Today, Here Tomorrow?

Steven Furnell

Pour l’auriculothérapie comme pour l’acupuncture somatique, on peut retenir divers effets. L’aiguille crée une micro-inflammation dont l’effet est transmis par les systèmes nerveux cérébro-spinal et végétatif ; ces actions sont modulées par le système limbique.

Concernant le système nerveux, l’action des aiguilles se comprend à plusieurs niveaux : modulation des neuromédiateurs et neurotransmetteurs pour améliorer les fonctions synaptiques et restaurer les circuits d’information, vasorégulation par le neurovégétatif pour normaliser l’oxygénation des organes, action sur le contrôle de la douleur par une sécrétion appropriée d’endorphines.

Les effets biochimiques sont corrélés aux systèmes nerveux. L’hypothèse d’un effet antiradicalaire est logique. L’effet psychique est indéniable () ().

Ces effets pourront se manifester sur les viscères, organes et vaisseaux, sur le hormonal, sur l’adaptation au stress, sur les états d’âme et l’humeur.

Pp. 179-201