




|
A
straightforward, accessible explanation of the realities of human
biological diversity *Human
Diversity Richard Lewontin
|
|
|
|
|
|
Computer
crime is a complex problem in perverse behaviour compounded by
the incredible complexity of the technology * Fighting
Computer Crime: A New Framework for Protecting Information
Donn B. Parker
|

|
"...we've
been here for only about a million years, we, the first species
that has devised the means for its self-destruction." * Earth
Time David Suzuki
|

Who says they don't write
space operas like they used to ?
|
|
|
The
future just isn't what it used to be * Luminous
Greg Egan |
|
Science
fiction is about imagining the present through the lens of a speculative
future *Foundation
(trilogy)
Isaac Asimov
|
|
|
*
|
|
*
|
Rendezvous
with Rama Arthur
C Clarke |
|
non-fiction/computers/management
science
|
|
Computer crime
is a complex problem in perverse behaviour compounded by the incredible
complexity of the technology
|
Fighting Computer
Crime: A New Framework for Protecting Information Donn B. Parker
Wiley Computer Publishing 0 471163 78 3 RRP $75.00 [9780471163787]
|
In the movie The Net,
what's-her-name takes seconds to crack high level security passwords
and two keystrokes to upload code that eliminates the evil Gatekeeper
program, whilst Jeff Goldblum in Independence Day develops a computer
virus within hours that effectively disables the aliens' defence
mechanism.
|
If only it
were that simple.
|
Donn Parker describes
computer crime and error as "a complex problem in perverse and
often irrational misbehaviour made even more difficult by the
incredible complexity of the technology." It is not enough to
simply preserve the confidentiality, integrity and availability
(CIA) of information, we must also understand the nature of our
adversaries and the attributes of the information they abuse and
misuse.
|
To information owners,
information security often appears a mystic art, replete with
highly technical terms and strange acronyms. But as Fighting
Computer Crime demonstrates, anyone can understand the issues
given a straightforward explanation in simple English with anecdotal
examples. Fighting Computer Crime is a collection of stories
from, by and about those who choose to appropriate information
that does not belong to them, and their victims, gathered from
28 years of studying computer crimes first hand. It is also a
framework for protecting against these crimes.
|
Divided vaguely into
"two" parts, the "first" gets into the mind of the hacker. Who
is he? Why does he commit computer crimes and what can he do?
"The one-profile-fits-all view of a hacker presents him as a juvenile,
male, delinquent, computer genius who comes from a home with only
one parent who ignores him and compensates by buying him a computer
and a telephone service." This also includes the miscreant computer
programmer who steals information or money by using exotic techniques
such as Trojan horse and logic bomb attacks. Unfortunately, true
computer criminals do not always conform to these instantly recognisable
stereotypes and their motives may range from financial to political,
religious and social agendas.
|
The
"second" part stresses the need for a multidisciplinary approach
to information security: a good technological understanding
must be coupled with management application to establish standards,
controls and classification of information. Here the author
outlines his proposal for a New Information Security Framework
based on the 6 Essential Foundation Elements of Availability,
Utility, Integrity, Authenticity, Confidentiality, and Possession
(of information).
|
There is no such thing
as perfect security. Completely secure systems are possible only
at the expense of infinite cost or zero utility (ie there are
no users at all, or every measure - an impossible task - has been
taken, resulting in enormous expense). Intelligent security management
seeks instead to balance the innumerable variables to achieve
an equitable ratio of risk to cost and efficiency.
|
Fighting
Computer Crime ought to be an integral part of any information
professional's library. It should also prove enjoyable for those
with an interest in technology and technological crime, and edifying
for the cyber hack looking for a few ideas.
|
Other works by
same author:
- not available Other
works on same/related theme:
- Penfold, Computer
Security, Peribo 0 709062 53 2 RRP $54.95 [9780709062530]
- Walker, Computer
Security Policies Sunscreen Firewalls, Prentice-Hall 0 130960
15 2 RRP $39.95 [9780130960153]
- Tiley, Personal
Computer Security, IDG Books Worldwide 1 568848 14 5 RRP $49.95
[9781568848143]
- Alexander, The
Underground Guide to Computer Security, Addison Wesley 0 201489
18 X RRP $41.95 [9780201489187]
|
Satay
|
|
|
|
|
|
|
|
|
|
|