Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.TECHNOLOGY TO ACHIEVE SECURE COMPUTER SYSTEMS 93 Applications and the Problem of Malicious Code Ideally ... When a Trojan horse runs, it can do a great deal of damage: delete files, corrupt data, send a message with the usera#39;s secrets to ... system, an executable program, a shell command file, or a macro in a spreadsheet or word-processing program are only a few of the possibilities.
|Title||:||Computers at Risk:|
|Author||:||Commission on Physical Sciences, Mathematics, and Applications, System Security Study Committee, National Research Council, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences|
|Publisher||:||National Academies Press - 1990-01-01|