Computer security differences for accidental and intentionally caused losses
نویسنده
چکیده
Research papers generally treat the problem of computer security as an intentional act to be solved by intellectually challenging methods such as encryption, descriptor-based systems, and program proving. Accidental and intentional acts are almost always referred to simultaneously; however, the safeguards are designed strictly to prevent intentional acts. It is generally thought that the same safeguards and strategies will be effective against both accidental and intentional acts. This is not necessarily true. In a paper on security assessment by Glaseman, Tum and Gaines ,1 accidental and intentional differences are not stated but are made subservient to the question of exploitation of vulnerabilities. As with most research papers on security, important research issues are discussed but they are oriented principally to intentional acts. This is evident in use of terms such as "intruder," "attacks," and "exploit," but no discussion penetrates research needs for errors, omissions and other accidents. In contrast, Courtney states in a paper on risk assessment: 2
منابع مشابه
Designing an Expert System for Internet Connection Problems Troubleshooting for wired network users
Man, is living in an era that the knowledge is estimated to be doubled in a relatively short time. The fast rate of technology's growth in the "Century of information", is caused by fast growth of communication technologies like the internet which has become one of the best tools for a quick, cheap, effective and vastly supported communication. For an efficient and effective usage of tools and ...
متن کاملDesigning an Expert System for Internet Connection Problems Troubleshooting for wired network users
Man, is living in an era that the knowledge is estimated to be doubled in a relatively short time. The fast rate of technology's growth in the "Century of information", is caused by fast growth of communication technologies like the internet which has become one of the best tools for a quick, cheap, effective and vastly supported communication. For an efficient and effective usage of tools and ...
متن کاملInvestigating the Perceived Threats of Computerized Accounting Information Systems in Developing Countries: An Empirical Study on Saudi Organizations
The objective of this paper is to investigate the significant perceived security threats of computerized accounting information systems (CAIS) in Saudi organizations. An empirical survey using a self-administered questionnaire has been carried out to achieve this objective. The survey results revealed that almost half of the responded Saudi organizations have suffered financial losses due to in...
متن کاملEconomic Models & Approaches in Information Security for Computer Networks
Security is one of the most important issues in computer networks. A common view of networks security is based on technical measures. Cryptographic models, firewalls and intrusion detection models are implemented in every information framework of an organization. Although deployment of such technologies may reduce security vulnerabilities and losses from security breaches, it is not clear to or...
متن کاملNon-Accidental Poisoning among Children in Rural Sri Lanka: A Two-Year Cross Sectional Study
Background:Non-accidental poisoning in the paediatric age group is uncommon and international literature on this subject is limited. There are no Sri Lankan paediatric studies on non-accidental poisoning to date. The objective of the current study was to explore the predisposing factors and profile of children less than 12 years in rural Sri Lanka who had non-accidental poisoning. Method:This c...
متن کامل