Skip to main content

IT – Risks and Security

  • Chapter
  • 1479 Accesses

Part of the book series: Springer Series in Reliability Engineering ((RELIABILITY))

Abstract

In its most basic form, a computer is just a programmable processor, with some means for input and output of the treated data. More complex computers have a far more complicated architecture, with special units for contact with the environment, such as keyboards, displays, communication line interfaces, readers for special media like USB and DVD, etc. They often also contain large data storage areas, such as an internal hard disk. Today, computers are often connected via networks, such as specialized local networks, as in a car, or completely general networks like the Internet. The distinction between a single computer and a cluster of computers becomes more and more blurred. The shared property of all these diverse systems is that they are all technical systems for the treatment of information. Thus, today we often talk of a more general concept of information technology (IT) systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Anderson R (2008) Security engineering: a guide to building dependable distributed systems. 2nd ed, Wiley, Indianapolis

    Google Scholar 

  • Anderson R, Böhme R, Clayton R, Moore T (2008) Security, economics, and the internal market. European Network and Information Security Agency (ENISA). http://www.enisa.europa.eu/doc/pdf/report_sec_econ_&_int_mark_20080131.pdf

    Google Scholar 

  • Bishop M (2005) Introduction to computer security. Addison-Wesley, Boston

    Google Scholar 

  • eWeek (2007) Worst data breaches ever. August 2007 http://www.eweek.com/c/a/Security/Worst-Data-Breaches-Ever/

    Google Scholar 

  • Gollmann D (2006) Computer security. Wiley, Chichester

    Google Scholar 

  • Gunnerhed M (1988) Risk assessment of cruise control. FOA Report E 30010-3.3, Swedish Defence Research Establishment, Stockholm

    Google Scholar 

  • JAS39 (1993) JAS 39 Gripen crash in Stockholm 1993 Aug 08, Report summary http://www.canit.se/~griffon/aviation/text/gripcras.htm

    Google Scholar 

  • Levenson NC (1996) Safeware: system safety and computers. Addison-Wesley, Reading

    Google Scholar 

  • Levenson N, Turner C (1993) An investigation of the Therac-25 accident, IEEE Computer 26(7):18-41

    Google Scholar 

  • NIST (2008) NIST SP 800-82 – Guide to industrial control systems (ICS) security. Final public draft, National Institute for Standards and Technology (NIST). http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf

    Google Scholar 

  • NRC (2007) Effects of Ethernet-based, non-safety related controls on the safe and continued operation of nuclerar power stations. NRC Information Notice 2007-15, US Nuclear Regulatory Commission (NRC). http://www.nrc.gov/reading-rm/doc-collections/ gen-comm/info-notices/2007/in200715.pdf

    Google Scholar 

  • Nuseibeh B (1997) Ariane 5: Who dunnit? IEEE Software 14(3):15–16

    Article  Google Scholar 

  • Perrow C (1999) Normal accidents: living with high-risk technologies. Princeton University Press, Princeton

    Google Scholar 

  • Pfleeger CP, Pfleeger SL (2007) Securty in computing. Prentice Hall, Upper Saddle River

    Google Scholar 

  • Prevelakis V, Diomidis S (2007) The Athens affair. IEEE Spectrum, July:18–25

    Google Scholar 

  • Risks (1988) Risks digest: Audi involuntary acceleration. http://catless.ncl.ac.uk/Risks/7.25.html

    Google Scholar 

  • Schneier B (2000) Secrets and lies: digital security in a networked world. Wiley, New York

    Google Scholar 

  • Schneier B (2003) Beyond fear: thinking sensibly about security in an uncertain world. Copernicus Books, New York

    Google Scholar 

  • Schneier B (2007) "Cyberwar" in Estonia. http://www.schneier.com/blog archives/2007/08/cyberwar_in_est.html

    Google Scholar 

  • Schneier B (2009) Schneier on security – a blog covering security and security technology. http://www.schneier.com/blog/

    Google Scholar 

  • SEMA (2008) Large scale Internet attacks: the Internet attacks on Estonia – Sweden’s emergency preparedness for Internet attacks. Swedish Emergency Management Agency (SEMA), Stockholm

    Google Scholar 

  • Storey N (1996) Safety-critical computer systems. Addison-Wesley, Harlow

    Google Scholar 

  • Yorktown (2008) USS Yorktown (CG 48) Official Navy Homepage. http://www.navysite.de/cg/cg48.html

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag London Limited

About this chapter

Cite this chapter

Fåk, V. (2010). IT – Risks and Security. In: Grimvall, G., Holmgren, Å., Jacobsson, P., Thedéen, T. (eds) Risks in Technological Systems. Springer Series in Reliability Engineering. Springer, London. https://doi.org/10.1007/978-1-84882-641-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-641-0_10

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-640-3

  • Online ISBN: 978-1-84882-641-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics