Computer-related risks

@inproceedings{Neumann1994ComputerrelatedR,
  title={Computer-related risks},
  author={Peter G. Neumann},
  year={1994}
}
  • P. Neumann
  • Published 18 October 1994
  • Computer Science
Developing a risk management system for information systems security incidents
TLDR
The current state of the art of information security, the important issues confronting managers, security enforcement measure/techniques, and potential threats and attacks are outlined, and a model for classification of threats and control measures is developed.
A longitudinal study of information system threat categories: the enduring problem of human error
TLDR
An elaborated taxonomy of information security threats is proposed and validated that provides additional insight into human error as a significant source of security risk and indicates that human error remains a significant and poorly recognized issue for information systems security.
Security Risks in the Computer-communication Infrastructure
TLDR
This written statement addresses some of the fundamental risks facing us in their present uses of computer-communications technology, and assess how those risks might change as the authors depend increasingly on that technology.
Investigating Computer-Related Crime
TLDR
This book discusses Cyber Crime as The authors Enter the 21st Century, the Reality of Information Warfare in the Corporate Environment, and the Importance of Formal Policies.
Combatting Insider Threats
  • P. Neumann
  • Computer Science
    Insider Threats in Cyber Security
  • 2010
TLDR
This chapter seeks to cope with insider misuse in a broad range of application domains— for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infraststructures and approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse.
Measurable Control System Security through Ideal Driven Technical Metrics
TLDR
The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security to demonstrate their value in guiding security thinking.
Safety critical systems: challenges and directions
  • J. Knight
  • Computer Science
    Proceedings of the 24th International Conference on Software Engineering. ICSE 2002
  • 2002
TLDR
From a software perspective, developing safety-critical systems in the numbers required and with adequate dependability is going to require significant advances in areas such as specification, architecture, verification and the software process.
WHAT GOES WRONG WITH SAFETY-CRITICAL SYSTEMS ?
TLDR
From a software perspective, developing safety critical systems in the numbers required and with adequate dependability is going to require significant advances in areas such as specification, architecture, verification, and process.
Security and Privacy Protection in Wireless Sensor Networks
TLDR
This work states that as the applications of WSNs become more complex and widespread, the ability to protect such systems from any unauthorized access will become increasingly important.
Understanding and Developing a Threat Assessment Model
TLDR
A threat and vulnerability assessment method developed with the needs of mobile computer systems in mind is discussed, which actively involves stakeholders and focuses upon a technical, socio-technical and business aspect of the system.
...
...