Title :
The computer-related risk of the year: computer abuse
Author :
Neumann, Peter G.
Author_Institution :
SRI Int., Menlo Park, CA, USA
fDate :
June 27 1988-July 1 1988
Abstract :
The defensive technology required to combat the threats represented by computer attacks, especially upon computer-based systems intended to meet such requirements as human safety, reliability, guaranteed availability, and real-time responsiveness, is discussed. Three fundamental gaps between what computer security actually enforces and the way computer systems are used are identified and discussed: technological (computer mechanism versus computer policy), sociotechnological (computer policy) versus social policy, and sociological (social policy versus antisocial behavior). The potential for computer attacks is discussed, along with ways to defend against computer system misuses.<>
Keywords :
computer installation; data privacy; security of data; social aspects of automation; antisocial behavior; computer abuse; computer attacks; computer mechanism; computer policy; computer security; computer system misuses; computer-based systems; computer-related risk; defensive technology; guaranteed availability; human safety; real-time responsiveness; reliability; social policy; sociotechnological gaps; Access control; Computer networks; Computer science; Computer security; Hardware; Humans; Information security; Invasive software; Laboratories; Telephony;
Conference_Titel :
Computer Assurance, 1988. COMPASS '88
Conference_Location :
Gaithersburg, MD, USA
DOI :
10.1109/CMPASS.1988.9631