O'Reilly logo

Computer-Related Risks by Peter G. Neumann - SRI International

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Security and Integrity Problems

Security used to bean inconvenience sometimes,but now it is a necessityall the time.

MARTINA NAVRATILOVA,AFTER THE STABBING OFMONICA SELES BY A FANOF STEFFI GRAF, 1993

WE NEXT CONSIDER A VARIETY OF PROBLEMS relating to system security, including confidentiality, integrity, and availability, among other requirements. In Section 5.1, we examine various malicious and other purposeful computer misuses that relate to security and integrity. In subsequent sections, we examine security accidents (Section 5.2) and computer misuse as it relates to applications—including spoofs (Section 5.3), denials of service (Sections 5.4 and 5.5), financial misuse and accidents (Sections 5.6 and 5.7), electronic voting ( ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required