Risikoanalyse verteilter und vernetzter Systeme

@inproceedings{Brunnstein1989RisikoanalyseVU,
  title={Risikoanalyse verteilter und vernetzter Systeme},
  author={Klaus Brunnstein and Simone Fischer-H{\"u}bner},
  booktitle={GI-Fachgespr{\"a}ch {\"u}ber Rechenzentren},
  year={1989}
}
Neben Problemen einzelner Rechensysteme (etwa “Computer-Viren”) nehmen die Risiken ungeplanter Nutzungsformen mit der schnell wachsenden Vernetzung einzeln unsicherer Systeme drastisch zu: unbefugte “Hacker” gelangen bereits mit geringen Kentnissen an sensitive Programme und Daten, und “Cracker” benutzen Netze zu Diebstahl, Spionage und Sabotage. Daruber hinaus fuhren unerkannte Denkfehler zu erheblichen Wirkungen, so beim Netz-induzierten “Borsen-Crash 1987”. Heute verbreitetes Benutzer… 

References

SHOWING 1-10 OF 13 REFERENCES

The internet worm program: an analysis

TLDR
The paper contains a review of the security flaws exploited by the worm program, and gives some recommendations on how to eliminate or mitigate their future use.

The UNIX system UNIX operating system security

TLDR
Some of the security hazards of the UNIX™ operating system are discussed, and ways to protect against them are suggested, in the hope that an educated community of users will lead to a level of protection that is stronger, but far more importantly, that represents a reasonable and thoughtful balance between security and ease of use of the system.

Stalking the wily hacker

  • C. Stoll
  • Computer Science, Physics
    CACM
  • 1988
An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?

The “worm” programs—early experience with a distributed computation

The “worm” programs were an experiment in the development of distributed computations: programs that span machine boundaries and also replicate themselves in idle machines. A “worm” is composed of

A prototype real-time intrusion-detection expert system

TLDR
The design and implementation of a prototype intrusion-detection expert system (IDES) are described, which adaptively learns the normal behavior of each user and detects and reports anomalous user behavior in real time.

An Intrusion-Detection Model

  • D. Denning
  • Computer Science
    1986 IEEE Symposium on Security and Privacy
  • 1986
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that

Incidence of adverse events and negligence in hospitalized patients. Results of the Harvard Medical Practice Study I.

TLDR
There is a substantial amount of injury to patients from medical management, and many injuries are the result of substandard care.

Aktionsplan für einen europäischen Raum der elektronischen Gesundheitsdienste, KOM(2004) 356 http://www.bmgfj.gv.at/cms/site/attachments

  • Aktionsplan für einen europäischen Raum der elektronischen Gesundheitsdienste, KOM(2004) 356 http://www.bmgfj.gv.at/cms/site/attachments

ISO 20000-2 – Service Management: Code of Practice

  • ISO 20000-2 – Service Management: Code of Practice