Computer security

被引:41
|
作者
Carl E. Landwehr
机构
[1] Mitretek Systems,
[2] 7525 Colshire Drive,undefined
[3] McLean,undefined
[4] VA 22102,undefined
[5] USA,undefined
关键词
Key words: Computer security – Vulnerability – Security principles – Security policy – Security mechanisms;
D O I
10.1007/s102070100003
中图分类号
学科分类号
摘要
A strong factor in the early development of computers was security – the computations that motivated their development, such as decrypting intercepted messages, generating gunnery tables, and developing weapons, had military applications. But the computers themselves were so big and so few that they were relatively easy to protect simply by limiting physical access to them to their programmers and operators. Today, computers have shrunk so that a web server can be hidden in a matchbox and have become so common that few people can give an accurate count of the number they have in their homes and automobiles, much less the number they use in the course of a day. Computers constantly communicate with one another; an isolated computer is crippled. The meaning and implications of “computer security” have changed over the years as well. This paper reviews major concepts and principles of computer security as it stands today. It strives not to delve deeply into specific technical areas such as operating system security, access control, network security, intrusion detection, and so on, but to paint the topic with a broad brush.
引用
收藏
页码:3 / 13
页数:10
相关论文
共 50 条
  • [21] COMPUTER SECURITY AND THE LAW
    BIGELOW, RP
    [J]. INFOSYSTEMS, 1982, 29 (12): : 84 - 84
  • [22] Journal of Computer Security
    Bella, Giampaolo
    Ryan, Peter
    [J]. JOURNAL OF COMPUTER SECURITY, 2009, 17 (03) : 237 - 237
  • [23] COMPUTER SECURITY AND IBM
    TUCHMAN, WL
    [J]. SCIENCE, 1977, 197 (4307) : 938 - 938
  • [24] Computer languages and security
    Cortesi, A
    Focardi, R
    [J]. COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2002, 28 (01) : 1 - 2
  • [25] COMPUTER SECURITY AND UNIONIZATION
    PRITCHARD, J
    [J]. INFORMATION PRIVACY, 1980, 2 (02): : 69 - 74
  • [26] FUTURE OF COMPUTER SECURITY
    PARKER, D
    [J]. INFORMATION AGE, 1982, 4 (01): : 15 - 18
  • [27] Computer security in China
    Heinlein, EB
    [J]. COMPUTERS & SECURITY, 1996, 15 (05) : 369 - 375
  • [28] SECURITY, JUSTICE, + COMPUTER
    WHISENAND, PM
    MEDAK, GM
    [J]. DATAMATION, 1971, 17 (12): : 24 - +
  • [29] BREACHES OF COMPUTER SECURITY
    LLAURADO, JG
    [J]. INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1983, 14 (02): : 87 - 93
  • [30] Computer network security
    Janson, P
    Rudin, H
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08): : 785 - 786