Wachet auf! Computer Security and the Millenium
نویسندگان
چکیده
Sleepers awake! The Y2K Problem may or may not be a technological disaster. But either way, the aftermath of the technological problems will be legal problems. Litigation over who should have done what will include damage claims for failures of software and liability for failure to prepare. The legal problems will be a disaster costing potentially trillions of dollars. Once the frenzy of litigation over Y2K has finished, the lawyers involved will look for other technological issues with similar characteristics and problems, and they will find computer security. This article brings these issues into focus and suggests how some businesses may respond, including methods to judgement proof the company. If such a strategy succeeds, computer security professionals could find themselves liable and stuck in a dwindling minority of asset rich targets in an increasingly dangerous cyber-space. 1 Year 2000 Disclosure and Its Ef-
منابع مشابه
Computer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کامل