Risky Business: Tackling Computer Security

By Peterson, Ivars | Science News, December 15, 1990 | Go to article overview
Save to active project

Risky Business: Tackling Computer Security

Peterson, Ivars, Science News

Risky business: Tackling computer security

NASA created the Space Physics Analysis Network a decade ago to enable scientists conducting NASA-related research to share data and ideas. But scientists were not the only users of this computer network. From 1981 into 1989, unauthorized users successfully penetrated network security dozens of times, roaming freely throughout the system. Although NASA officials say these intruders apparently didn't destroy or alter any data, future intrusions might prove considerably less benign.

The list of security breaches affecting computer systems worldwide grows week by week: virus attacks, lottery fraud, information theft, computer break-ins, espionage. Such incidents demonstrate the weakness of the invisible fences protecting most computer systems and networks from intruders, whether joy-riding high-school hackers, disgruntled employees or international spies.

In response to concerns about the safety, reliability and security of U.S. computer systems, a National Research Council panel last week issued a report detailing the extreme vulnerability of present-day systems.

"The committee believes that our computer system and information are at risk, and that this in turn places society at risk," says computer scientist David D. Clark of the Massachusetts Institute of Technology, who chaired the panel. "Our central conclusion is that national computing and communications systems are vulnerable to potentially catastrophic security breaches and accidental failures."

The report -- one of the most comprehensive looks at security problems in nonmilitary, unclassified computer systems and networks -- paints an alarming picture of the parlous state of those systems. "The modern thief can steal more with a computer than with a gun," theauthors state. "Tommorrow's terrorist may be able to do more damage with a keyboard than with a bomb.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
Loading One moment ...
Project items
Cite this article

Cited article

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited article

Risky Business: Tackling Computer Security


Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

While we understand printed pages are helpful to our users, this limitation is necessary to help protect our publishers' copyrighted material and prevent its unlawful distribution. We are sorry for any inconvenience.
Full screen

matching results for page

Cited passage

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.

Are you sure you want to delete this highlight?