Computer insecurity

related topics
{system, computer, user}
{law, state, case}
{math, number, function}
{theory, work, human}
{war, force, army}
{company, market, business}
{rate, high, increase}

Many current computer systems have only limited security precautions in place. This computer insecurity article describes the current battlefield of computer security exploits and defenses. Please see the computer security article for an alternative approach, based on security engineering principles.

Contents

Security and systems design

Many current real-world computer security efforts focus on external threats, and generally treat the computer system itself as a trusted system. Some knowledgeable observers consider this to be a disastrous mistake, and point out that this distinction is the cause of much of the insecurity of current computer systems — once an attacker has subverted one part of a system without fine-grained security, he or she usually has access to most or all of the features of that system.[citation needed] Because computer systems can be very complex, and cannot be guaranteed to be free of defects, this security stance tends to produce insecure systems.

Full article ▸

related documents
IBM System/370
Disk image
Data Link Layer
Multicast
Computer networking
DirectX
LAN switching
File server
Computer display standard
Video CD
Signaling System 7
TOPS-20
Exidy Sorcerer
Gigabit Ethernet
Internet Message Access Protocol
Blue Gene
Hercules Graphics Card
General Packet Radio Service
IBM AIX (operating system)
High fidelity
Video Graphics Array
Digital Visual Interface
DDR SDRAM
Apple Desktop Bus
Data compression
Slow-scan television
GE-600 series
IBM 1401
Terminate and Stay Resident
Magnetic tape