Information Technology Reference
In-Depth Information
2. One commentator stated “it is virtually impossible to ever be
completely sure that any computing system of any size is com
pletely secure” ( The Limits of Computing , Chapter 9, ques
tion 9.5). In view of the possibilities for unauthorized access
to data described in this chapter, evaluate whether you think
this sentence is overly guarded, overly pessimistic, or about
right. For example, consider the following questions:
a . Is the statement overly guarded? Could the word “virtually”
be omitted? In other words, can you describe any reasonably
sized computing system that could be guaranteed to be se
cure? How would you know it did not have security leaks?
b . Is the statement overly pessimistic or alarmist? Would it be
more accurate to state, “Although it may be somewhat dif
ficult, it is quite feasible to create and operate a secure
computing system.”
Justify your answer.
3. The March 20, 1989, issue of Time magazine (pp. 25-26) dis
cusses the potential for security violations within networks of
computers within the military. For example, Time reported
that “the U. S. arrested and expelled a military attache for al
legedly trying to steal details of computersecurity programs.”
The article then considers the following hypothetical scenario:
An enemy agent in the Pentagon sends a computer
virus through the WorldWide Military Command
and Control System, which the U.S. commanders
would rely on in wartime for information and co
ordination. The virus sits undetected. When hostili
ties begin, the agent sends a message that triggers
the virus, erasing everything in the system.
A different virus is introduced into NATO's logistics
computers. Triggered just as the Soviet army marches
into West Germany, the virus alters messages so that
all allied supplies are sent to the wrong places. By the
time the mistake is corrected a day or two later, key
parts of NATO's defense line have collapsed.
a. Discuss some ways that such a virus might be injected into
such a computer network. Who might be able to plant the
virus? How?
Search WWH ::




Custom Search