Chapter 8 Implementation and Testing

What goes up must come down. Ask any system administrator.

Anonymous

America’s increasingly computerized society will become vulnerable to attacks by criminals and high-tech terrorists unless new computer-security precautions are taken, a National Research Committee (NRC) announced today [SPT, 1990].

Take your ordinary, garden-variety terrorist. Add a tempting, unprotected corporate target that contains one of the organization’s most vital strategic assets, — a target that, if knocked out, could lead to major disruptions of service or even to corporate bankruptcy. What you’ve got is a recipe for disaster — the soft underbelly of the Information Age — and it’s time to shake off some of the dangerous ...

Get Building A Global Information Assurance Program now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.