CHAPTER 3PRINCIPLES AND PILLARS OF TRUSTWORTHY COMPUTING
3.1 VITAL ISSUES OF TRUSTWORTHY COMPUTING
The needs and vital issues of trustworthy computing [89, 90] surround us and penetrate all our everyday life. Most of our activities are tightly related to the use of computing technologies – seeking any important information, purchasing goods in a store, calling on a smartphone, watching a Smart TV, and so on – everything is now related to the use of computing and computing devices. So we depend so much on the trustworthiness of computers and software that the need of trustworthy computing became vital. Software bugs can be used as vulnerabilities to attack software products. Confidential information that we have to trust to computers – personal data, credit card numbers, PIN codes, and so on – becomes the subject of attacks with the purpose of stealing it and using for malicious purposes. Naive emotional reaction of computer users to fake warnings on danger for personal bank accounts forces people to unreasonable actions that lead to passing personal secrets to hackers by clicking Web references one should never click (phishing). Any computer user should keep in mind that at any moment he or she is on the Internet, there is a great risk of being attacked. How can this be avoided? The first rule is always to behave reasonably: do not trust traps such as panic style emails or Web pages; do not pass on confidential information by yourselves to unknown people or sites. The second ...
Get Trustworthy Cloud Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.