Skip to main content

Currently Skimming:

J - Examples of Risks Posed by Unprotected Information
Pages 469-473

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 469...
... As discussed in Chapters 1 and 2, cryptographic technologies are part of an overall strategy to reduce information vulnerability. J.1 RISKS ADDRESSED BY CRYPTOGRAPHY FOR AUTHENTICATION • A pair of reporters wrote a controversial book about the hacking activities of a particular group.
From page 470...
... The request came via computer tape, accompanied by phony authorization forms, and was detected and canceled only because it overdrew the debited account.5 Cryptography for authentication might have demonstrated that the authorization was invalid. • Forty-five Los Angeles police officers were cited from 1989 to 1992 for using department computers to run background checks for personal reasons.6 Cryptography for authentication might have been part of an audit trail that would have reduced the likelihood of abusing the department's computer system.
From page 471...
... In another instance, a major multinational company with customer support offices in China experienced a break-in in which Chinese nationals apparently copied paper documents and unencrypted computer files. Encryption of the stored files might have reduced the likelihood that the data contained therein would have been compromised.
From page 472...
... As a result, $1,100 in merchandise was charged to him, and his home computer was crashed remotely via his unlisted telephone number.11 • An employee of Disney World gained illegal access to Disney computer systems in 1994, reading confidential data files on employees and deleting information from the systems.12 • A major multinational chemical manufacturer headquartered in the United States has deployed an on-line videotext system that contains considerable amounts of proprietary information about processes used by that company. This manufacturer has disconnected one of its plants, located in the Far East, from the videotext network because of evidence that the government of the nation in which the plant is located is both willing and able to tap into this network to obtain valuable information that could be passed on to the manufacturer's foreign competitors.
From page 473...
... 14San Jose Mercury News, December 14, 1984.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.