Abstract
In its most basic form, a computer is just a programmable processor, with some means for input and output of the treated data. More complex computers have a far more complicated architecture, with special units for contact with the environment, such as keyboards, displays, communication line interfaces, readers for special media like USB and DVD, etc. They often also contain large data storage areas, such as an internal hard disk. Today, computers are often connected via networks, such as specialized local networks, as in a car, or completely general networks like the Internet. The distinction between a single computer and a cluster of computers becomes more and more blurred. The shared property of all these diverse systems is that they are all technical systems for the treatment of information. Thus, today we often talk of a more general concept of information technology (IT) systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Anderson R (2008) Security engineering: a guide to building dependable distributed systems. 2nd ed, Wiley, Indianapolis
Anderson R, Böhme R, Clayton R, Moore T (2008) Security, economics, and the internal market. European Network and Information Security Agency (ENISA). http://www.enisa.europa.eu/doc/pdf/report_sec_econ_&_int_mark_20080131.pdf
Bishop M (2005) Introduction to computer security. Addison-Wesley, Boston
eWeek (2007) Worst data breaches ever. August 2007 http://www.eweek.com/c/a/Security/Worst-Data-Breaches-Ever/
Gollmann D (2006) Computer security. Wiley, Chichester
Gunnerhed M (1988) Risk assessment of cruise control. FOA Report E 30010-3.3, Swedish Defence Research Establishment, Stockholm
JAS39 (1993) JAS 39 Gripen crash in Stockholm 1993 Aug 08, Report summary http://www.canit.se/~griffon/aviation/text/gripcras.htm
Levenson NC (1996) Safeware: system safety and computers. Addison-Wesley, Reading
Levenson N, Turner C (1993) An investigation of the Therac-25 accident, IEEE Computer 26(7):18-41
NIST (2008) NIST SP 800-82 – Guide to industrial control systems (ICS) security. Final public draft, National Institute for Standards and Technology (NIST). http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf
NRC (2007) Effects of Ethernet-based, non-safety related controls on the safe and continued operation of nuclerar power stations. NRC Information Notice 2007-15, US Nuclear Regulatory Commission (NRC). http://www.nrc.gov/reading-rm/doc-collections/ gen-comm/info-notices/2007/in200715.pdf
Nuseibeh B (1997) Ariane 5: Who dunnit? IEEE Software 14(3):15–16
Perrow C (1999) Normal accidents: living with high-risk technologies. Princeton University Press, Princeton
Pfleeger CP, Pfleeger SL (2007) Securty in computing. Prentice Hall, Upper Saddle River
Prevelakis V, Diomidis S (2007) The Athens affair. IEEE Spectrum, July:18–25
Risks (1988) Risks digest: Audi involuntary acceleration. http://catless.ncl.ac.uk/Risks/7.25.html
Schneier B (2000) Secrets and lies: digital security in a networked world. Wiley, New York
Schneier B (2003) Beyond fear: thinking sensibly about security in an uncertain world. Copernicus Books, New York
Schneier B (2007) "Cyberwar" in Estonia. http://www.schneier.com/blog archives/2007/08/cyberwar_in_est.html
Schneier B (2009) Schneier on security – a blog covering security and security technology. http://www.schneier.com/blog/
SEMA (2008) Large scale Internet attacks: the Internet attacks on Estonia – Sweden’s emergency preparedness for Internet attacks. Swedish Emergency Management Agency (SEMA), Stockholm
Storey N (1996) Safety-critical computer systems. Addison-Wesley, Harlow
Yorktown (2008) USS Yorktown (CG 48) Official Navy Homepage. http://www.navysite.de/cg/cg48.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag London Limited
About this chapter
Cite this chapter
Fåk, V. (2010). IT – Risks and Security. In: Grimvall, G., Holmgren, Å., Jacobsson, P., Thedéen, T. (eds) Risks in Technological Systems. Springer Series in Reliability Engineering. Springer, London. https://doi.org/10.1007/978-1-84882-641-0_10
Download citation
DOI: https://doi.org/10.1007/978-1-84882-641-0_10
Publisher Name: Springer, London
Print ISBN: 978-1-84882-640-3
Online ISBN: 978-1-84882-641-0
eBook Packages: EngineeringEngineering (R0)