Computer Insecurity
Risking the System
Book
Chapter
This chapter has established that security is not a simple problem to solve. Indeed, the requirements to preserve the confidentiality, integrity, and availability of IT systems and data introduce the need for ...
Chapter
Chapter
Chapter
Chapter
IT security is everyone’s problem. None of the victims described in this chapter was uniquely prone to the breaches they suffered, and although some systems may be more susceptible than others, nobody can cons...
Chapter
Whether we like it or not, certain aspects of IT security are beyond our direct control, and there will always be a degree of reliance upon other parties to take care of some things on our behalf. However, thi...
Chapter
This chapter has given an indication of the range of attacks to which our systems and data may be exposed. Threats such as hacking and malicious software are not going to disappear, and thus represent a persua...