Computer systems are vulnerable to many threats which can inflict various types of damage resulting in significant losses. Damage can range from minor errors which sap database integrity to fires which destroy entire computer centers. Losses can stem from the actions of supposedly trusted employees defrauding the system to outside hackers roaming freely through the Internet. The exact amount of computer-related losses is unknowable; many losses are never discovered and others are covered up to avoid unfavorable publicity.
This bulletin increases reader awareness of threats to computer systems by giving a broad picture of the threat environment in which systems are operated today. An overview of many of today's common threats will be useful to organizations studying their own threat environments with a view toward developing solutions specific to their organization.
This bulletin summarizes a chapter of the computer security handbook being developed by CSL. We have already published bulletins summarizing other chapters on establishing a computer security program, considering people issues in computer security, and developing computer security policy. Additional bulletins will be issued as chapters are finalized.
Computer systems are vulnerable to many threats which can inflict various types of damage resulting in significant losses. Damage can range from minor errors which sap database integrity to fires which destroy entire computer centers. Losses can stem from the actions of supposedly trusted employees...
See full abstract
Computer systems are vulnerable to many threats which can inflict various types of damage resulting in significant losses. Damage can range from minor errors which sap database integrity to fires which destroy entire computer centers. Losses can stem from the actions of supposedly trusted employees defrauding the system to outside hackers roaming freely through the Internet. The exact amount of computer-related losses is unknowable; many losses are never discovered and others are covered up to avoid unfavorable publicity.
This bulletin increases reader awareness of threats to computer systems by giving a broad picture of the threat environment in which systems are operated today. An overview of many of today's common threats will be useful to organizations studying their own threat environments with a view toward developing solutions specific to their organization.
This bulletin summarizes a chapter of the computer security handbook being developed by CSL. We have already published bulletins summarizing other chapters on establishing a computer security program, considering people issues in computer security, and developing computer security policy. Additional bulletins will be issued as chapters are finalized.
Hide full abstract