Chapter 8 Implementation and Testing
What goes up must come down. Ask any system administrator.
America’s increasingly computerized society will become vulnerable to attacks by criminals and high-tech terrorists unless new computer-security precautions are taken, a National Research Committee (NRC) announced today [SPT, 1990].
Take your ordinary, garden-variety terrorist. Add a tempting, unprotected corporate target that contains one of the organization’s most vital strategic assets, — a target that, if knocked out, could lead to major disruptions of service or even to corporate bankruptcy. What you’ve got is a recipe for disaster — the soft underbelly of the Information Age — and it’s time to shake off some of the dangerous ...