Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Breakdowns in Computer Security -  Michael E Rentell

Breakdowns in Computer Security (eBook)

Commentary and Analysis

(Autor)

Peter M Jenner (Herausgeber)

eBook Download: PDF
2014 | 1. Auflage
104 Seiten
Elsevier Science (Verlag)
978-1-4831-0607-6 (ISBN)
Systemvoraussetzungen
24,95 inkl. MwSt
(CHF 24,35)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short comment indicating where improvements could have been made to alleviate or prevent the more damaging aspects of the problem. The types of generic risks (i.e. line tapping, espionage, communications failure, theft, malicious programming, hacking, disaster, and virus) that exist around IT systems into which each of the incidents described has been categorized are also considered. The book provides a complete analysis of the overall situation in respect of risks and threats to assets due to computer systems. References on computer weekly publications are also provided. Senior management personnel with responsibilities for data processing operations and company IT personnel will find this book beneficial.
Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short comment indicating where improvements could have been made to alleviate or prevent the more damaging aspects of the problem. The types of generic risks (i.e. line tapping, espionage, communications failure, theft, malicious programming, hacking, disaster, and virus) that exist around IT systems into which each of the incidents described has been categorized are also considered. The book provides a complete analysis of the overall situation in respect of risks and threats to assets due to computer systems. References on computer weekly publications are also provided. Senior management personnel with responsibilities for data processing operations and company IT personnel will find this book beneficial.

Front Cover 1
Breakdowns in Computer Security: Commentary and Analysis 2
Copyright page 3
Table of contents 4
Introduction 6
Chapter 1. Computer Breakdown Incidents 1988 7
SEPTEMBER 1988 7
OCTOBER 1988 10
NOVEMBER 1988 12
DECEMBER 1988 15
Chapter 2. Computer Breakdown Incidents 1989 17
JANUARY 1989 17
FEBRUARY 1989 19
MARCH 1989 23
APRIL 1989 24
MAY 1989 26
JUNE 1989 29
JULY 1989 33
AUGUST 1989 40
SEPTEMBER 1989 44
OCTOBER 1989 46
DECEMBER 1989 52
Chapter 3. Computer Breakdown Incidents 1990 53
JANUARY 1990 53
FEBRUARY 1990 55
MARCH 1990 58
APRIL 1990 62
MAY 1990 63
JUNE 1990 65
JULY 1990 67
AUGUST 1990 73
Chapter 4. Generic Risk by Type 76
1. Poor supervision of staff 76
2. Line tapping 76
3· Espionage 76
4. Communications failure 77
5. Theft 77
6· Fault Control 78
7. Other crimes 78
8. Malicious programming 78
9. Fraud/embezzlement 79
10. Line fraud against a financial institution 79
11. Program testing 80
12. Hacking 80
13. Management faults 80
14. Disaster 81
15. Virus 81
Chapter 5. The Wider View 84
Information Assets in Perspective 84
Properties of Information 84
PA Experience 93
Awareness 93
Too Much Paper 94
Configuration Control 94
Security Breaches 94
Over-estimation of Cost 95
Index 96
Computer Weekly Publications 101
The Computer Weekly Guide to Resources 1990 101
Aliens' Guide to the Computer Industry 101
Computer Jargon Explained 102
What To Do When a Micro Lands On Your Desk 102
Considering Computer Contracting? 102
Hitchhikers' Guide to Electronics in the' 90s 103
A Simple Introduction to Data and Activity Analyss 103
Open Systems: The Basic Guide to OSI and its Implementation 103
IT Perspectives Conference: The Future of the IT Industry 104
Computer Weekly Book of Puzzlers 104
Women in Computing 104
How to Get Jobs in Microcomputing 105
Low Cost PC Networking 105
Selling Information Technology: A Practical Career Guide 105
Managing Information Security: A Non-technical Management Guide 105

Erscheint lt. Verlag 16.5.2014
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Mathematik
Technik
ISBN-10 1-4831-0607-1 / 1483106071
ISBN-13 978-1-4831-0607-6 / 9781483106076
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 10,6 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95