Publisher: Addison-Wesley, 1990, 567 pages
ISBN: 0-201-53067-8
Keywords: Information Security
This book collects some of the most informative, provocative, and frightening reports on the vulnerability of computer systems to harmful, if not catastrophic attacks,. Whether these attacks are carried out against computer networks or against personal computers — whether driven by mischief or by malice — the consequences can be costly and dangerous. Countermeasures are, in most cases, straightforward.
Peter J. Denning, Editor-in-Chief of Communications of the ACM, has been following and writing about computer security for many years. For this book, he has carefully selected a range of articles and commentaries to illuminate recent events and ongoing issues for both nontechnical and technical readers. The book, which is organized into six parts, opens with a discussion of the worldwide networks vulnerable to computer attack. Denning then defines and distinguishes among the various threats lately given widespread attention: intruders, worms, and viruses. The discussion of viruses provides the history and mode of operations of more than 100 viruses, with a guide for virus detection and removal in MS-DOS-based PCs.
Subsequent sections reach into the background, the technical details, and the effects of particular attacks, with reports from Cornell and M.I.T. in the Internet Worm incident, and Clifford Stoll's original account of the Wily Hacker. Part V transports the reader into the cyberpunk subculture, including an interview with the editor of W.O.R.M. magazine. A final section explores the sociopolitical, ethical, and legal implications of computer attacks, and introduces the concept of crimoids — media-driven, high-tech crimes — leaving the reader with this ominous suggestion: Future threats may be even greater than intruders, worms, and viruses.
Computer touch everyone in a modern society. The stories recounted in this book are a pointed warning that our computer systems are already under attack, that the privacy and integrity of information in our personal, business, and research activities are seriously threatened, and that the security of free societies is on the line. In order to thwart these attacks, we must all first recognize and understand the threat.
A reaction on the Internet Worm. Leaves you untouched.
Comments
There are currently no comments
New Comment