Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Für diesen Artikel ist leider kein Bild verfügbar.

Computer-Related Risks

Buch | Softcover
384 Seiten
1994
Addison Wesley (Verlag)
978-0-201-55805-0 (ISBN)
CHF 38,80 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This book presents the various computer-related risks, describes events drawn from the author's comprehensive data archive on computing mishaps, and suggests ways to lessen such risks in the future. It provides software developers, systems engineers and policy makers with an awareness of the risks.
This fascinating and useful book by noted expert Peter Neumann contains accounts of mishaps, failures, and other disasters attributed to computers. Computer-based systems are everywhere in our lives, from the smallest radio components to the largest aerospace installations; and while computers can make our lives easier, they can also fail, and the people using them can make errors-causing inconvenience or even catastrophe. Neumann characterizes different kinds of computer-related risks, discusses risk causes and effects, and considers their implications. He also suggests ways to minimize such risks in the future. Featured are sections on reliability and safety problems, security vulnerabilities, privacy, and global systems.

About Peter Neumann Peter G. Neumann (Principal Scientist in the Computer Science Laboratory of SRI International) runs the popular and provocative on-line Internet newsgroup, The Risks Forum, which he started in 1985. He also writes the widely read "Inside Risks" column in the Communications of the ACM. Running RISKS is a sideline to his research and development interests, which include computer hardware and software, systems, networks, and communications, as well as security, reliability, and safety--and how to attain them. He is a Fellow of both the ACM and the IEEE. He is often the first person called when computer disasters occur. 020155805XAB04062001

1. The Nature Of Risks.


Background on Risks.



Sources of Risks.



Adverse Effects.



Defensive Measures.



Guide to Summary Tables.



2. Reliability And Safety Problems.


Communication Systems.



Problems in Space.



Defense.



Civil Aviation.



Trains.



Ships.



Control-System Safety.



Robotics and Safety.



Medical Health and Safety.



Electrical Power.



Computer Calendar Clocks.



Computing Errors.



3. Security Vulnerabilities.


Security Vulnerabilities and Misuse Types.



Pest Programs and Deferred Effects.



Bypass of Intended Controls.



Resource Misuse.



Other Attack Methods.



Comparison of the Attack Methods.



Classical Security Vulnerabilities.



Avoidance of Security Vulnerabilities.



4. Causes And Effects.


Weak Links and Multiple Causes.



Accidental versus Intentional Causes.



5. Security And Integrity Problems.


Intentional Misuse.



Security Accidents.



Spoofs and Pranks.



Intentional Denials of Service.



Unintentional Denials of Service.



Financial Fraud by Computer.



Accidental Financial Losses.



Risks in Computer-Based Elections.



Jail Security.



6. Threats To Privacy And Well-Being.


Needs for Privacy Protection.



Privacy Violations.



Prevention of Privacy Abuses.



Annoyances in Life, Death, and Taxes.



What's in a Name?



Use of Names as Identifiers.



7. A System-Oriented Perspective.


The Not-So-Accidental Holist: A System View.



Putting Your Best Interface Forward.



Distributed Systems.



Woes of System Development.



Modeling and Simulation.



Coping with Complexity.



Techniques for Increasing Reliability.



Techniques for Software Development.



Techniques for Increasing Security.



Risks in Risk Analysis.



Risks Considered Global(ly).



8. A Human-Oriented Perspective.


The Human Element.



Trust in Computer-Related Systems and in People.



Computers, Ethics, and the Law.



Mixed Signals on Social Responsibility.



Group Dynamics.



Certification of Computer Professionals.



9. Implications And Conclusions.


Where to Place the Blame.



Expect the Unexpected!



Avoidance of Weak Links.



Assessment of the Risks.



Assessment of the Feasibility of Avoiding Risks.



Risks in the Information Infrastructure.



Questions Concerning the NII.



Avoidance of Risks.



Assessment of the Future. 020155805XT04062001

Erscheint lt. Verlag 24.11.1994
Verlagsort Boston
Sprache englisch
Maße 160 x 230 mm
Gewicht 526 g
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-10 0-201-55805-X / 020155805X
ISBN-13 978-0-201-55805-0 / 9780201558050
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich