{"title":"今年与电脑有关的风险:电脑滥用","authors":"P. Neumann","doi":"10.1109/CMPASS.1988.9631","DOIUrl":null,"url":null,"abstract":"The defensive technology required to combat the threats represented by computer attacks, especially upon computer-based systems intended to meet such requirements as human safety, reliability, guaranteed availability, and real-time responsiveness, is discussed. Three fundamental gaps between what computer security actually enforces and the way computer systems are used are identified and discussed: technological (computer mechanism versus computer policy), sociotechnological (computer policy) versus social policy, and sociological (social policy versus antisocial behavior). The potential for computer attacks is discussed, along with ways to defend against computer system misuses.<<ETX>>","PeriodicalId":224212,"journal":{"name":"Computer Assurance, 1988. COMPASS '88","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"The computer-related risk of the year: computer abuse\",\"authors\":\"P. Neumann\",\"doi\":\"10.1109/CMPASS.1988.9631\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The defensive technology required to combat the threats represented by computer attacks, especially upon computer-based systems intended to meet such requirements as human safety, reliability, guaranteed availability, and real-time responsiveness, is discussed. Three fundamental gaps between what computer security actually enforces and the way computer systems are used are identified and discussed: technological (computer mechanism versus computer policy), sociotechnological (computer policy) versus social policy, and sociological (social policy versus antisocial behavior). The potential for computer attacks is discussed, along with ways to defend against computer system misuses.<<ETX>>\",\"PeriodicalId\":224212,\"journal\":{\"name\":\"Computer Assurance, 1988. COMPASS '88\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1988-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Assurance, 1988. COMPASS '88\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMPASS.1988.9631\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Assurance, 1988. COMPASS '88","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPASS.1988.9631","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The computer-related risk of the year: computer abuse
The defensive technology required to combat the threats represented by computer attacks, especially upon computer-based systems intended to meet such requirements as human safety, reliability, guaranteed availability, and real-time responsiveness, is discussed. Three fundamental gaps between what computer security actually enforces and the way computer systems are used are identified and discussed: technological (computer mechanism versus computer policy), sociotechnological (computer policy) versus social policy, and sociological (social policy versus antisocial behavior). The potential for computer attacks is discussed, along with ways to defend against computer system misuses.<>