Chapter 5. Security and Integrity Problems
Security used to bean inconvenience sometimes,but now it is a necessityall the time.
MARTINA NAVRATILOVA,AFTER THE STABBING OFMONICA SELES BY A FANOF STEFFI GRAF, 1993
WE NEXT CONSIDER A VARIETY OF PROBLEMS relating to system security, including confidentiality, integrity, and availability, among other requirements. In Section 5.1, we examine various malicious and other purposeful computer misuses that relate to security and integrity. In subsequent sections, we examine security accidents (Section 5.2) and computer misuse as it relates to applications—including spoofs (Section 5.3), denials of service (Sections 5.4 and 5.5), financial misuse and accidents (Sections 5.6 and 5.7), electronic voting ( ...
Get Computer-Related Risks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.