Security

R. Baecker
{"title":"Security","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0013","DOIUrl":null,"url":null,"abstract":"Throughout history, humanity has invented valuable technologies and ways to organize society. These innovations are typically accompanied by risks. Fire cooks food, and also provides heat on cold nights. Yet, when left unchecked, fire can cause huge damage as well as loss of life. Cities enabled new forms of community and commerce. However, they brought us more thievery, and made it easier for epidemics to spread. The automobile allowed a separation of locales for work and residence; trucks allowed goods to be shipped long distances. But vehicular accidents have caused far greater injury and loss of life than did mishaps with horses and mules. Information technology, like other technologies, has potential for good and for harm. In the first six chapters, we introduced aspects of human activity, such as education, medicine, and government, in which IT has been transformative and mostly positive. The next three chapters examine areas in which the negatives of IT are dominant, in which risks seem everywhere. This chapter focuses on security. IT security flaws are exploited by outsiders for personal or political gain. In Chapter 8 we shall look at safety, where the risks are often injury or loss of life. In Chapter 9, we shall look at privacy, where the risks are exposure of private, confidential, and even sensitive information. Security is the attribute of a computer system that ensures that it can continue to function properly after an attack. Attacks against computer systems happen routinely now, are in the news almost every week, and are accelerating in numbers and in impact. Damage to both individuals and organizations—financial losses, chaos, and deteriorating morale— is severe. We shall provide a primer on the multitude of ways computer systems, from large networks to mobile phones, can be ‘hacked’ so that they no longer function properly. We shall define the most common kinds of destructive software, often called malware. We will discuss large-scale data breaches, which now happen frequently and expose the personal data of millions to billions of people. The word hackers refers to individuals who disrupt digital technologies and thereby damage the functioning of an institution or a society.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers and Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oso/9780198827085.003.0013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Throughout history, humanity has invented valuable technologies and ways to organize society. These innovations are typically accompanied by risks. Fire cooks food, and also provides heat on cold nights. Yet, when left unchecked, fire can cause huge damage as well as loss of life. Cities enabled new forms of community and commerce. However, they brought us more thievery, and made it easier for epidemics to spread. The automobile allowed a separation of locales for work and residence; trucks allowed goods to be shipped long distances. But vehicular accidents have caused far greater injury and loss of life than did mishaps with horses and mules. Information technology, like other technologies, has potential for good and for harm. In the first six chapters, we introduced aspects of human activity, such as education, medicine, and government, in which IT has been transformative and mostly positive. The next three chapters examine areas in which the negatives of IT are dominant, in which risks seem everywhere. This chapter focuses on security. IT security flaws are exploited by outsiders for personal or political gain. In Chapter 8 we shall look at safety, where the risks are often injury or loss of life. In Chapter 9, we shall look at privacy, where the risks are exposure of private, confidential, and even sensitive information. Security is the attribute of a computer system that ensures that it can continue to function properly after an attack. Attacks against computer systems happen routinely now, are in the news almost every week, and are accelerating in numbers and in impact. Damage to both individuals and organizations—financial losses, chaos, and deteriorating morale— is severe. We shall provide a primer on the multitude of ways computer systems, from large networks to mobile phones, can be ‘hacked’ so that they no longer function properly. We shall define the most common kinds of destructive software, often called malware. We will discuss large-scale data breaches, which now happen frequently and expose the personal data of millions to billions of people. The word hackers refers to individuals who disrupt digital technologies and thereby damage the functioning of an institution or a society.
安全
纵观历史,人类发明了有价值的技术和组织社会的方式。这些创新通常伴随着风险。火可以烹饪食物,也可以在寒冷的夜晚提供热量。然而,如果不加以控制,火灾会造成巨大的破坏和生命损失。城市催生了新的社区和商业形式。然而,它们给我们带来了更多的盗窃,使流行病更容易传播。汽车使工作地点和居住地点分离;卡车使货物得以长途运输。但车辆事故造成的伤害和生命损失远远大于马匹和骡子造成的伤害和生命损失。信息技术,像其他技术一样,有潜在的好处和坏处。在前六章中,我们介绍了人类活动的各个方面,如教育、医学和政府,在这些方面,信息技术具有变革性,而且大多是积极的。接下来的三章考察了IT的负面影响占主导地位的领域,在这些领域,风险似乎无处不在。本章重点介绍安全性。外部人士利用IT安全漏洞谋取个人或政治利益。在第8章中,我们将讨论安全,其中的风险通常是受伤或生命损失。在第9章中,我们将关注隐私,其中的风险是私人,机密甚至敏感信息的暴露。安全性是计算机系统的一种属性,它确保计算机系统在受到攻击后能够继续正常工作。针对计算机系统的攻击现在已经司空见惯,几乎每周都会出现在新闻中,而且在数量和影响上都在加速。对个人和组织的损害——经济损失、混乱和士气低落——都是严重的。我们将提供计算机系统,从大型网络到移动电话,可以被“黑掉”,使它们不再正常工作的多种方法的入门。我们将定义最常见的破坏性软件,通常称为恶意软件。我们将讨论现在频繁发生的大规模数据泄露事件,并将数百万人的个人数据暴露给数十亿人。黑客这个词指的是破坏数字技术,从而破坏一个机构或社会功能的个人。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信