Protecting IT systems from cyber crime

R Benjamin, B Gladman, B Randell - The Computer Journal, 1998 - ieeexplore.ieee.org
R Benjamin, B Gladman, B Randell
The Computer Journal, 1998ieeexplore.ieee.org
Large-scale commercial, industrial and financial operations are becoming ever more
interdependent, and ever more dependent on IT. At the same time, the rapidly growing
interconnectivity of IT systems, and the convergence of their technology towards industry-
standard hardware and software components and sub-systems, renders these IT systems
increasingly vulnerable to malicious attack. This paper is aimed particularly at readers
concerned with major systems employed in medium to large commercial or industrial …
Large-scale commercial, industrial and financial operations are becoming ever more interdependent, and ever more dependent on IT. At the same time, the rapidly growing interconnectivity of IT systems, and the convergence of their technology towards industry-standard hardware and software components and sub-systems, renders these IT systems increasingly vulnerable to malicious attack. This paper is aimed particularly at readers concerned with major systems employed in medium to large commercial or industrial enterprises. It examines the nature and significance of the various potential attacks, and surveys the defence options available. It concludes that IT owners need to think of the threat in more global terms, and to give a new focus and priority to their defence. Prompt action can ensure a major improvement in IT resilience at a modest marginal cost, both in terms of finance and in terms of normal IT operation.
ieeexplore.ieee.org
Showing the best result for this search. See all results