Catálogo de publicaciones - libros
Computer Insecurity: Risking the System
Steven Furnell
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Theory of Computation; Management of Computing and Information Systems; Data Encryption
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2005 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-1-85233-943-2
ISBN electrónico
978-1-84628-270-6
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2005
Información sobre derechos de publicación
© Springer-Verlag London 2005
Cobertura temática
Tabla de contenidos
The Problem of Computer Insecurity
Steven Furnell
This chapter has established that security is not a simple problem to solve. Indeed, the requirements to preserve the confidentiality, integrity, and availability of IT systems and data introduce the need for safeguards that go well beyond simply having controls on the computers themselves. Nonetheless, the extent to which we depend upon IT dictates that security cannot be ignored. If systems are not protected, there is plenty that can go wrong, and so it is in our interest to take the matter seriously. Unfortunately, however, it soon becomes apparent that although security may be accepted at a surface level, actually getting organisations and individuals to realise how it applies to them can represent a challenge in its own right. As such, a grudging acceptance is often more likely than whole-hearted commitment.
Pp. 1-15
The Need to Raise Awareness
Steven Furnell
This chapter has given an indication of the range of attacks to which our systems and data may be exposed. Threats such as hacking and malicious software are not going to disappear, and thus represent a persuasive reason for having security. Worms and viruses in particular have become far more problematic in recent years, exploiting new methods to enter our systems, and doing so at dramatically increased speeds via the Internet. The need for a proactive stance on our part is ever more apparent.
The Net is also linked to other opportunities for our data to be attacked or compromised, and the unfortunate fact is that, in some cases, we are left at the mercy of other peoples’ attitudes towards security if we want to use the services that they offer. It, therefore, requires us to at least be careful whom we are dealing with, and ensure that we do not share our sensitive data in a cavalier manner.
Having said all this, it is worth remembering that a major source of problems can also come from within. Although external attack attempts may be greater in volume, it is often the more informed internal attackers and abusers who have the most chance of success, if security is not there to stop them.
Pp. 17-39
Common Failings That Compromise Security
Steven Furnell
Whether we like it or not, certain aspects of IT security are beyond our direct control, and there will always be a degree of reliance upon other parties to take care of some things on our behalf. However, this need not be a problem, as long as we have realistic expectations of what can be relied upon, and do not assume protection by default. For example, while we must always hope that software vendors and service providers will try their best to give us secure and reliable systems, there is ample evidence to show that problems can still occur. So, although there are many scenarios in which we can expect to rely upon others, we should not be doing so blindly.
Of course, external parties can be more than just a source of problems. There are also people that we can turn to for help—both in terms of addressing security, and when something goes wrong. Here again, however, it is important to make sure that we are placing faith in the right hands. IT security responsibilities should not be entrusted lightly, and if external help is to be considered, it makes sense to ensure that appropriate and credible skills are on offer. As such, having an understanding of the practical distinctions between different security qualifications and certifications can improve the chances of getting someone who can do the job that we want.
Pp. 41-72
The Widespread Nature of Vulnerability
Steven Furnell
IT security is everyone’s problem. None of the victims described in this chapter was uniquely prone to the breaches they suffered, and although some systems may be more susceptible than others, nobody can consider themselves immune. In many cases we need to re-evaluate the factors that we perceive to make us vulnerable. The discussion has clearly shown that breaches are not the exclusive preserve of large organisations and that the reasons we might find our systems being targeted are not necessarily those that we first expected. In addition, we need to be realistic about what we are protecting against. If we consider deliberate attacks to be the only threat, then we are likely to overlook accidental incidents that could be equally damaging.
The discussion has again shown that there is no such thing as 100% security and that no matter how much attention is devoted to it, the problem can never be considered solved once and for all. As such, a realistic strategy is about managing and reducing risk, rather than removing it altogether.
Pp. 73-103
Attack and Exploitation of Systems
Steven Furnell
This chapter has given an indication of the range of attacks to which our systems and data may be exposed. Threats such as hacking and malicious software are not going to disappear, and thus represent a persuasive reason for having security. Worms and viruses in particular have become far more problematic in recent years, exploiting new methods to enter our systems, and doing so at dramatically increased speeds via the Internet. The need for a proactive stance on our part is ever more apparent.
The Net is also linked to other opportunities for our data to be attacked or compromised, and the unfortunate fact is that, in some cases, we are left at the mercy of other peoples’ attitudes towards security if we want to use the services that they offer. It, therefore, requires us to at least be careful whom we are dealing with, and ensure that we do not share our sensitive data in a cavalier manner.
Having said all this, it is worth remembering that a major source of problems can also come from within. Although external attack attempts may be greater in volume, it is often the more informed internal attackers and abusers who have the most chance of success, if security is not there to stop them.
Pp. 105-145
External Influences and Dependencies
Steven Furnell
Whether we like it or not, certain aspects of IT security are beyond our direct control, and there will always be a degree of reliance upon other parties to take care of some things on our behalf. However, this need not be a problem, as long as we have realistic expectations of what can be relied upon, and do not assume protection by default. For example, while we must always hope that software vendors and service providers will try their best to give us secure and reliable systems, there is ample evidence to show that problems can still occur. So, although there are many scenarios in which we can expect to rely upon others, we should not be doing so blindly.
Of course, external parties can be more than just a source of problems. There are also people that we can turn to for help—both in terms of addressing security, and when something goes wrong. Here again, however, it is important to make sure that we are placing faith in the right hands. IT security responsibilities should not be entrusted lightly, and if external help is to be considered, it makes sense to ensure that appropriate and credible skills are on offer. As such, having an understanding of the practical distinctions between different security qualifications and certifications can improve the chances of getting someone who can do the job that we want.
Pp. 147-178
Insecurity: Here Today, Here Tomorrow?
Steven Furnell
Pour l’auriculothérapie comme pour l’acupuncture somatique, on peut retenir divers effets. L’aiguille crée une micro-inflammation dont l’effet est transmis par les systèmes nerveux cérébro-spinal et végétatif ; ces actions sont modulées par le système limbique.
Concernant le système nerveux, l’action des aiguilles se comprend à plusieurs niveaux : modulation des neuromédiateurs et neurotransmetteurs pour améliorer les fonctions synaptiques et restaurer les circuits d’information, vasorégulation par le neurovégétatif pour normaliser l’oxygénation des organes, action sur le contrôle de la douleur par une sécrétion appropriée d’endorphines.
Les effets biochimiques sont corrélés aux systèmes nerveux. L’hypothèse d’un effet antiradicalaire est logique. L’effet psychique est indéniable () ().
Ces effets pourront se manifester sur les viscères, organes et vaisseaux, sur le hormonal, sur l’adaptation au stress, sur les états d’âme et l’humeur.
Pp. 179-201