SRI International Computer Science Laboratory

Peter G. Neumann: "Computer-Related Risks"

Published by ACM Press / Addison Wesley

1995, ISBN 0-201-55805-X, 384pp. paperback.
$24.75 (Telephone orders 1-800-447-2226)
$22.25 for ACM members; ACM Order #704943 (1-800-342-6626,
or 1-212-626-0500 outside the US or inside metro NY)

This sobering description of many computer-related failures throughout our world deflates the hype and hubris of the industry. Peter Neumann analyzes the failure modes, recommends sequences for prevention and ends his unique book with some broadening reflections on the future -- Ralph Nader, Consumer Advocate


PREFACE
1 THE NATURE OF RISKS
1.1 Background on Risks
1.2 Sources of Risks
1.3 Adverse Effects
1.4 Defensive Measures
1.5 Guide to Summary Tables
1.6 Summary of the Chapter

2 RELIABILITY AND SAFETY PROBLEMS
2.1 Communication Systems
2.2 Problems in Space
2.3 Defense
2.4 Civil Aviation
2.5 Trains
2.6 Ships
2.7 Control-System Safety
2.8 Robotics and Safety
2.9 Medical Health and Safety
2.10 Electrical Power
2.11 Computer Calendar Clocks
2.12 Computing Errors
2.13 Summary of the Chapter

3 SECURITY VULNERABILITIES
3.1 Security Vulnerabilities and Misuse Types
3.2 Pest Programs and Deferred Effects
3.3 Bypass of Intended Controls
3.4 Resource Misuse
3.5 Other Attack Methods
3.6 Comparison of the Attack Methods
3.7 Classical Security Vulnerabilities
3.8 Avoidance of Security Vulnerabilities
3.9 Summary of the Chapter

4 CAUSES AND EFFECTS
4.1 Weak Links and Multiple Causes
4.2 Accidental Versus Intentional Causes
4.3 Summary of the Chapter

5 SECURITY AND INTEGRITY PROBLEMS
5.1 Intentional Misuse
5.2 Security Accidents
5.3 Spoofs and Pranks
5.4 Intentional Denials of Service
5.5 Unintentional Denials of Service
5.6 Financial Fraud by Computer
5.7 Accidental Financial Losses
5.8 Risks in Computer-Based Elections
5.9 Jail Security
5.10 Summary of the Chapter

6 THREATS TO PRIVACY AND WELL-BEING
6.1 Needs for Privacy Protection
6.2 Privacy Violations
6.3 Prevention of Privacy Abuses
6.4 Annoyances in Life, Death, and Taxes
6.5 What's in a Name?
6.6 Use of Names as Identifiers
6.7 Summary of the Chapter

7 A SYSTEM-ORIENTED PERSPECTIVE
7.1 The Not-So-Accidental Holist: A System View
7.2 Putting Your Best Interface Forward
7.3 Distributed Systems
7.4 Woes of System Development
7.5 Modeling and Simulation
7.6 Coping with Complexity
7.7 Techniques for Increasing Reliability
7.8 Techniques for Software Development
7.9 Techniques for Increasing Security
7.10 Risks in Risk Analysis
7.11 Risks Considered Global(ly)
7.12 Summary of the Chapter

8 A HUMAN-ORIENTED PERSPECTIVE
8.1 The Human Element
8.2 Trust in Computer-Related Systems and in People
8.3 Computers, Ethics, and the Law
8.4 Mixed Signals on Social Responsibility
8.5 Group Dynamics
8.6 Certification of Computer Professionals
8.7 Summary of the Chapter

9 IMPLICATIONS AND CONCLUSIONS
9.1 Where to Place the Blame
9.2 Expect the Unexpected!
9.3 Avoidance of Weak Links
9.4 Assessment of the Risks
9.5 Assessment of the Feasibility of Avoiding Risks
9.6 Risks in the Information Infrastructure
9.7 Questions Concerning the NII
9.8 Avoidance of Risks
9.9 Assessment of the Future
9.10 Summary of the Chapter and the Book

Epilogue

A Background Materials
A.1 RISKS References
A.2 On-Line Sources
A.2.1 The Risks Forum
A.2.2 PRIVACY Digests
A.2.3 The VIRUS-L Digest
A.3 General Bibliography Items
GLOSSARY
NOTES
REFERENCES
INDEX