march/april 1999 issue

the co-op bookshop's guide to good

reading feature articles, reviews and reading suggestions

[member discount applies to all books reviewed - but one of these books has an extra discount!]

 

 

 

 

A straightforward, accessible explanation of the realities of human biological diversity *Human Diversity Richard Lewontin
Arm yourself with the terms and names that will add credibility to your architectural opinions * Architecture: A Crash Course Hilary French
It's all about simulation * The Computational Beauty of Nature: Computer Explorations of Fractals, Chaos, Complex Systems, and Adaptation Gary William Flake
Computer crime is a complex problem in perverse behaviour compounded by the incredible complexity of the technology * Fighting Computer Crime: A New Framework for Protecting Information Donn B. Parker

"...we've been here for only about a million years, we, the first species that has devised the means for its self-destruction." * Earth Time David Suzuki

Who says they don't write space operas like they used to ?

* The Seafort Saga (in 5 books) David Feintuch
The future just isn't what it used to be * Luminous Greg Egan
Science fiction is about imagining the present through the lens of a speculative future *Foundation (trilogy) Isaac Asimov
*
Excession Iaian M. Banks
*
Rendezvous with Rama Arthur C Clarke
non-fiction/computers/management science
The Net
Computer crime is a complex problem in perverse behaviour compounded by the incredible complexity of the technology
Fighting Computer Crime: A New Framework for Protecting Information Donn B. Parker Wiley Computer Publishing 0 471163 78 3 RRP $75.00 [9780471163787]

In the movie The Net, what's-her-name takes seconds to crack high level security passwords and two keystrokes to upload code that eliminates the evil Gatekeeper program, whilst Jeff Goldblum in Independence Day develops a computer virus within hours that effectively disables the aliens' defence mechanism.

If only it were that simple.

Donn Parker describes computer crime and error as "a complex problem in perverse and often irrational misbehaviour made even more difficult by the incredible complexity of the technology." It is not enough to simply preserve the confidentiality, integrity and availability (CIA) of information, we must also understand the nature of our adversaries and the attributes of the information they abuse and misuse.

To information owners, information security often appears a mystic art, replete with highly technical terms and strange acronyms. But as Fighting Computer Crime demonstrates, anyone can understand the issues given a straightforward explanation in simple English with anecdotal examples. Fighting Computer Crime is a collection of stories from, by and about those who choose to appropriate information that does not belong to them, and their victims, gathered from 28 years of studying computer crimes first hand. It is also a framework for protecting against these crimes.

Divided vaguely into "two" parts, the "first" gets into the mind of the hacker. Who is he? Why does he commit computer crimes and what can he do? "The one-profile-fits-all view of a hacker presents him as a juvenile, male, delinquent, computer genius who comes from a home with only one parent who ignores him and compensates by buying him a computer and a telephone service." This also includes the miscreant computer programmer who steals information or money by using exotic techniques such as Trojan horse and logic bomb attacks. Unfortunately, true computer criminals do not always conform to these instantly recognisable stereotypes and their motives may range from financial to political, religious and social agendas.

The "second" part stresses the need for a multidisciplinary approach to information security: a good technological understanding must be coupled with management application to establish standards, controls and classification of information. Here the author outlines his proposal for a New Information Security Framework based on the 6 Essential Foundation Elements of Availability, Utility, Integrity, Authenticity, Confidentiality, and Possession (of information).

There is no such thing as perfect security. Completely secure systems are possible only at the expense of infinite cost or zero utility (ie there are no users at all, or every measure - an impossible task - has been taken, resulting in enormous expense). Intelligent security management seeks instead to balance the innumerable variables to achieve an equitable ratio of risk to cost and efficiency.

Fighting Computer Crime ought to be an integral part of any information professional's library. It should also prove enjoyable for those with an interest in technology and technological crime, and edifying for the cyber hack looking for a few ideas.

Other works by same author:

- not available Other works on same/related theme:

- Penfold, Computer Security, Peribo 0 709062 53 2 RRP $54.95 [9780709062530]

- Walker, Computer Security Policies Sunscreen Firewalls, Prentice-Hall 0 130960 15 2 RRP $39.95 [9780130960153]

- Tiley, Personal Computer Security, IDG Books Worldwide 1 568848 14 5 RRP $49.95 [9781568848143]

- Alexander, The Underground Guide to Computer Security, Addison Wesley 0 201489 18 X RRP $41.95 [9780201489187]

Satay