Summary
This chapter has established that security is not a simple problem to solve. Indeed, the requirements to preserve the confidentiality, integrity, and availability of IT systems and data introduce the need for safeguards that go well beyond simply having controls on the computers themselves. Nonetheless, the extent to which we depend upon IT dictates that security cannot be ignored. If systems are not protected, there is plenty that can go wrong, and so it is in our interest to take the matter seriously. Unfortunately, however, it soon becomes apparent that although security may be accepted at a surface level, actually getting organisations and individuals to realise how it applies to them can represent a challenge in its own right. As such, a grudging acceptance is often more likely than whole-hearted commitment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag London Limited
About this chapter
Cite this chapter
Furnell, S. (2005). The Problem of Computer Insecurity. In: Computer Insecurity. Springer, London. https://doi.org/10.1007/1-84628-270-5_1
Download citation
DOI: https://doi.org/10.1007/1-84628-270-5_1
Publisher Name: Springer, London
Print ISBN: 978-1-85233-943-2
Online ISBN: 978-1-84628-270-6
eBook Packages: Computer ScienceComputer Science (R0)