Computer Insecurity: Risking the System

Front Cover
Springer Science & Business Media, 2005 - Business & Economics - 240 pages

Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent years have convincingly illustrated that the problem is increasing in both scale and cost.

Computer Insecurity: Risking the System approaches its topic from the perspective of vulnerability – how can your system be attacked? Covering technical issues and human factors, the comprehensively researched text makes reference to numerous real-life security incidents, which help to provide persuasive practical evidence of the problems and the impacts that result.

Key issues covered include:

• the problem of computer insecurity

• the need to raise security awareness

• common failings that compromise protection

• the attack and exploitation of systems

• considerations in responding to the threats

Presented in clear and lucid terms, the discussion is invaluable reading for all business and computing professionals who wish for an overview of the issues rather than a shopping list of the security measures available.

‘In today’s connected world no-one can afford to ignore computer security, this book tells you why, and what you should do about it, in simple non-technical language.’

Dr Jeremy Ward, Director of Service Development, Symantec (UK) Ltd

‘Computer Insecurity contains loads of practical advice supported by an abundance of real world examples and research. If you don’t understand what all the fuss concerning computer security is about then this book was written for you.’Jeff Crume, CISSP

Executive IT Security Architect, IBM and author of ‘Inside Internet Security – What hackers don’t want you to know’

‘I have long been looking for a book that would give answers to why rather than how we cater for Information and Communication Systems Security ... I recommend it wholeheartedly to anyone that wishes to extend their knowledge’

Professor Sokratis K. Katsikas, University of the Aegean, Greece

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

The Problem of Computer Insecurity
1
ITs What We Depend On
3
What Is IT Security?
5
What Do We Think About Security?
8
Laying the Foundations
10
Summary
14
The Need to Raise Awareness
17
Walking in a Wireless Wonderland?
19
MalwareA Problem That Just Wont Go Away
113
Safe Today Vulnerable Tomorrow?
114
Multifarious Mischief
115
The Case of Benevolent Benjamin?
120
Once Again the Net Gets Slammed
123
Your Data in Their Hands
125
Identity Theft on the Net
131
Going Phishing
134

Users Go Mobile but Security Stays at Home
23
Protecting Pocket Devices
24
Laptop Laxity
26
Dangerous Disposal
28
Your PC Can Tell a Story
32
When Admin Got It Backwards
34
What Are the Users Up To?
37
Summary
38
Common Failings That Compromise Security
41
Dont Listen to Me Im Only the Security Officer
44
Fostering a Security Culture
46
Security Training
52
Password Problems
54
I Know Security Is Available but How Do I Use It?
62
Ambiguous Advisories
69
Summary
71
The Widespread Nature of Vulnerability
73
Military Mishaps
75
Government Gaffs
77
Does Size Make a Difference?
78
Your System Is Not Invisible
85
Your Insecurity Someone Elses Problem
87
Were Safe Weve Got a Firewall
90
Home Is Where the Hack Is
94
Accidents Will Happen
98
Summary
103
Attack and Exploitation of Systems
105
The Hacker Ethic
109
Watching Your Own
140
Summary
145
External Influences and Dependencies
147
Its Not Just Microsofts Problem
151
Addressing Vulnerabilities Is Easier Said Than Done
155
When Vulnerability Reports Can Make You Vulnerable
158
Informing the Hacker
159
Fake Reports
162
Doing More Harm Than Good
165
Buying a Secure Service
167
Whos Qualified to Help?
172
Summary
178
Insecurity Here Today Here Tomorrow?
179
The Carrot or the Stick
180
Speak Up or Hush Up?
185
Threats of Tomorrow
188
Malware on the Move
191
New Applications New Threats
194
What to Do Now
197
Conclusion
200
Glossary of Terms
203
Online Resources
207
An Introduction to Security Standards
209
Other Standards
214
References
219
Index
235
Copyright

Other editions - View all

Common terms and phrases

About the author (2005)

Dr. Steven Furnell is a reader in information systems security at the University of Plymouth, and has already published one book: "Cybercrime: Vandalising The Information Society", Paperback: 336 pages ; Publisher: Addison-Wesley Pub Co; 1st edition (December 21, 2001), ISBN: 0201721597.

Aside from the assigned reviewers and a number of Dr Furnell’s academic colleagues, the manuscript has also been read by Dr Jeremy Ward, Service Development Director of for Symantec UK, who provided summary feedback describing it as "really excellent".