Sturges, Stephen with Graham Winch, "Computer Attack: The Role of Modeling in Development an Intergrated Securtiy Policy", 1996

ua435

Many trends in computing- distributing processing, telecoms, reliance on computing for key business processes- combine to increase greatly the risks and vulnerability of firms to computer attack. The form of attack is also is also diversifying- mischief-making by "hackers" or virus writers, sabotage by disgruntled employees, fraudulent activity, or simple random hardware or software failure. The threats and potential costs to firms of breakdowns in security can be very large, involving the need to replace or re-engineering systems, to recover or reconstruct key information and data, and maybe even to try to re-establish goodwill with customers who may have been affected. The literature reflects that while the general issues here are appreciated, few firms understand fully the potential threats to their business, nor have explicit policies and procedures to guard against them.

This is the whole item.

Date created
  • 1996
Type
Processing Activity License

ITEM CONTEXT

Part of

227da936724c4223c5a64764d3922694

Scope and Contents
Part of

ca4810593b2703dcaa087957ab13af91

Scope and Contents
Part of

23d738ba88f8333bc39725f9cb5bd0b8

Scope and Contents
Collection

System Dynamic Society Records

Scope and Contents
Collecting area

Items