Index

Boldfaced page numbers indicate a primary description. Italic page numbers indicate a glossary item.

Abstract data types, 240

in Clark-Wilson, 242

Abstract objects, 242

Abstraction, 235, 240

concept of, 240

data, 240

procedure, 240

role of assumptions, 241

Access controls, 98

changes in parameters, 111

discretionary, 99

copy propagation problem, 99

group-based, 99

mandatory, 99

Access-control lists, 99

Accidental misuse, 126

ACM

code of professional conduct, 181

Ada, 236

rendezvous, 236

Adams, Douglas, 292

Administration, 213

Adversities, 7

Aegis

Airbus shot down, 35, 207, 268

display insufficiency, 266

Aeromexico crash, 45

Age problems, 87, 88, 288

Aggregation of data, 112

AIDS Trojan horse, 141

Air France Airbus A320, 45

Air Inter, 46

Air New Zealand, 47, 266, 287

Air-cargo shutdown

giraffes die, 157

Air-conditioning outage, 164

Air-traffic control

collision avoidance, 48

impersonations, 49

outages, 15, 17, 48

problems, 48

Airbus

A320

accidents, 45

flight control, 43

color coding, 43

Aircraft accidents

Aeromexico, 45

Air New Zealand, 47, 287

Airbus A320

Air France, 45

Air Inter, 46

Indian Airlines, 45

Lufthansa, 46

British Midland, 44, 287

collision

with birds, 47

with private planes, 45

F-18, 38, 287

Ilyushin, 46

KAL 007, 47

Lauda Air, 44

lightning, 48

Northwest, 44

Akkerhuis, Jaap, 90

Alarm system example, 95, 131, 180

ALCOA

electrician killed by guided vehicle, 66

Aliasing

avoidance of, 240

in operating systems, 107

in programming languages, 236

vulnerabilities, 107

Allstate Insurance, 216

AMD 29000 flaws, 93

Anderson, Jack

on Chernobyl, 78

Anik E-1, E-2, 30

Anwar, Yasmin, 327

Apollo 11, 26

Arens, Yigal, 193

Ariane, 28

Aries, 27, 121

ARPAnet, 127, 345

1980 collapse, 13, 123, 127, 156, 267, 289

1986 severance, 14, 127, 156

nodes vulnerable, 129

Asimov, Isaac

“It’s Such a Beautiful Day,” 312

Laws of Robotics, 64

psychohistory, 257

AT&T

1990 blockage, 14, 123, 127, 156, 213

power problem, 213

Atlas failures, 28

Atlas-Agena, 26, 121

Atlas-Centaur, 159

ATM, see Automated teller machines

Atomicity, 241

incomplete, 107, 108

Attacks

bypass, 105

password, 108

pest programs, 103-105

trapdoor, 105

Auditing, 213

compromisible, 107

Authentication, 211

biometric, 255

compromise, 211

criteria for, 254

flaws, 106, 107

mutual, 212

servers, 212

techniques for, 253-255

Authorization, 99

flaws, 100, 106

Automated teller machines

breakdowns, 156

fraud, 165

outage due to snow, 164

Automobile

microprocessor interference, 162

traffic control breakdown, 156

Availability, 97

of distributed data, 212

Aviation problems, 40-50. See also Aircraft accidents

autopilots on 757/767, 44

summary, 50

B-1 bomber, 217

Backup, 213

absence

downs NY Public Library, 158

downs Theatre Royal, 157

battery drained, 16

British Rail crash, 54

deleted data still present, 145

prematurely decommissioned, 175

shuttle

design, 21

STS-1 uninitializable, 20

STS-20 delay, 22

STS-36 delay, 24

Bandar, Mary, 87

Bank of America MasterNet, 216

Bank of New York overdraft, 267, 287

Barometric effects, 163

Barrett, Jean Paul, 175

BART (Bay Area Rapid Transit)

1980 outages, 54

power outage, 55

Bartelt, Mark, 322

Beck, Ulrich, 315

Beckman, Joseph M., 328

Beertema, Piet, 146

Benson, David B., 318

Berkowitz, Howard, 162

Berra, Yogi, 239

Bidzos, James, 331

Billing errors, 190

Los Angeles property tax, 217

Black Hawk

interference, 158

shootdowns, 35, 266

Blame, 261, 285-286

analysis, 256

distributed, 206

Blaze, Matt, 188

Blinn, Tom, 78

Blodgett, G.C., 87

BloomBecker, Buck, 323

Blue Cross, 196, 217

BMEWS defense system, 38

Board, John, 173

Boebert, Earl, 318

Boeing

color coding, 43

KC-135, 47

Boone, Donny Ray, 195

Bootload

flaws introduced, 106

security risks, 239

virus corruption, 105

Borenstein, Nathaniel S., 315

Bork, Robert, 186

Bosworth, Ken, 157

Boulders fall, 63

Bowsher, Charles A., 217

Branscomb, Lewis, 219

Breisacher, Lee, 87

Brinkley, David, 191

Brinks scammed, 167

British Midland crash, 44, 267

Broadcast protocols for fault tolerance, 328

Brodeur, Paul, 321

Brooks, Frederick P., 331

Brown, Forman, 190

Brunnstein, Klaus

virus catalog, 324

Buchsbaum, Sol, 214

Bullock, Conrad, 91

Burleson, Donald Gene, 139

Burnham, David, 326

Business Men’s Assurance, 217

Bynum, Terry, 330

Bypass attacks, 105-111

Byzantine

algorithms, 213, 228, 271, 329

clocks, 87

failures, 213, 228

C (programming language), 236

compiler Trojan horse, 115

C++, 236

object-oriented, 237

C-17 cost overrun, 218

Caching, invisibility of, 240

Cadsoft, antipiracy spoof, 153

Caen, Herb, 291

Cain, Ron, 66

Calling-Number Identification, 182

Capstone, 188

Captain Midnight, 153

Carson, Johnny

media interference, 162

CASE (computer-aided software engineering), 238

Casey, Steven M., 316

Cassandra attitude, 296

Causes of risks, 5, 120-131

Celine, Hagbard, 194

Cellular telephone

eavesdropping, 185

fraud, 136

Certification of professionals, 281-283

challenge, 284

Ceruzzi, Paul, 317

Challenges

concluding, 310

human issues, 283

preliminary, 11

privacy, 202

reliability, 95

security, 179

systems, 259

vulnerabilities, 118

weak links, 131

Chapman, Gary, 328

Charette, Robert N.

risk analysis, 255

Chemical industry

in Britain, 61

explosion in the Netherlands, 61

Chernenko spoof, 146

Chernobyl, 77, 128, 266

Chernousenko, Vladimir, 77

Chinese launchpad explosion, 31

Chorus Line, A, blacked out, 161

Chow, Stanley, 327

Churchill, Mae, 325

Clark-Wilson integrity model, 226, 240, 242

implementation, 242

summarized in Table 7.3, 242

Clarke, Arthur C., 306

Cleopatra’s Nose, 331

Client-server model, 240

Clipper Chip, 187

Clock problems, 85-93

arithmetic errors, 89

Byzantine, 87

century ambiguities, 87

leap-year ambiguities, 90

millenium ambiguities, 92

overflows, 88

remote, 87, 89

summary, 91

summer time, 89

and ingot cooling, 89

police system fails, 89

year-end, 89

CNID, see Calling-Number Identification

Coding

error-correcting, 229, 328, 329

error-detecting, 328

Cohen, Fred, 104

Cohen, Norman, 207

Coke-machine telephone calls, 157

Collaboration, 278-281

Collins-Thompson, Kevyn, 188

Collor de Mello, Fernando, 145

Colville, John, 326

Communications problems, 13-19

summary, 18

Community Alert Network

Trojan horsed, 138

Complexity, 221-227

Components

equal trustworthiness, 210

relative trustworthiness, 210

Compromise, 211, 345

of auditing, 107

of authentication, 211

of consistency, 213

with a multiuse password, 110

through programming languages, 236

by Trojan horse, 115

COMPUSEC, 345

Computational problems, 93

Computers at Risk, 316

COMSEC, 345

Concept formation, 233

Concurrency control

management, 212

virtualized, 241

Condyles, Nick, 327

Confidentiality, 96

in auditing, 213

in communications, 212

loss of, 211

Configuration flaws introduced, 106

Conn, Dickie Ann, 191

Consistency

between code and spec, 237

between specs and requirements, 236

in Clark-Wilson, 242

in distributed databases, 212

problems in recovery, 213

through formal analysis, 238

Continental Cablevision

antipiracy spoof, 153

Control system

problem summary, 64

safety, 60-67

Conway’s Law, 204

Conway, Joanne, 192

Corbató, Fernando Jose

CTSS bug, 144

system development, 239

Covert channels

aggressive exploitation, 111

in distributed systems, 212

threats, 129

Cox, Henry, 325

Craigen, Dan, 322

Crepin-Leblond, Olivier M.J., 319

Criteria, 345

for safety, 233

for security, 233, 329

for system evaluations, 233

Critical failures, 12

Critical requirements, 3

Criticality, 345

Crompton, C.S.,II, 195

Cryptosystem

private-key, 347

public-key, 348

secret-key, 348

shared-key, 349

CTCPEC, 345

CTSS (Compatible Time-Sharing System)

recursion, 155

security accident, 144

DAC, see Discretionary access controls

Danforth, Sen. John, 186

Database misuse

background checks, 184

government data, 185

murder, 184

police data, 185

Date problems, 85-93

summary, 91

Datri, Anthony, 71

DC-8

engine failures, 47

simultaneous engine failure, 124

DC-10 crash, 121

Death

erroneously reported, 190

masked by automatic payments, 190

Decommission, 6

Defense problems, 34-39

summary, 39

Defibrillator deactivation, 71

Delta-178 (rocket), 28

Dement, Martin Lee, 194

Denial of service

ATMs shut down by roof collapse, 164

bogus cable chips, 155

CTSS recursion, 155

Encyclopaedia Brittanica, 154

insurance company held hostage, 154

intentional, 153-155

lithographer data, 154

newspaper sabotage, 154

Prescott Valley, AZ, 154

unintentional, 155-165

Washington DC analyst, 154

Denning, Dorothy E., 330

Clipper Chip, 187-188

Denning, Peter J., 208, 323, 330

intelligent life, 152

new common sense, 305

Dependability, 98, 345

feasibility, 296-299

Dependence, 345

hidden, 210

identification of, 242

on less-accessible components, 212

on less-trustworthy components, 210

Depends on, 345

Derbyshire, Drew, UUPC, 90

DES, see Digital Encryption Standard

Desert Storm, 47

Design

failures due to, 262

not reflecting implementation flaws, 117

principles, 240

impact, 243

DeTreville, John, 124

Development problems, 216-218

Devine, Robert, 319

Diana, Princess, 186

Dictionary attack, 109, 114

Digital Encryption Standard, 254, 345

Digital signature, 345

Digital Signature Standard, 280, 346

Discovery security error, 144

Discretionary access controls, 99. See also Access controls

Display board spoof, 150

Disraeli, Benjamin, 286

Distributed data problems, 210, 212, 213

Distributed system risks, 209-215

Dolan, Brad, 320

Door closing kills woman, 62

Dorsett, Robert, 40, 44

DOS, 346

Downs, Diane, 175

Drawbridge

closes, barriers don’t open, 63

opens, short circuit, 63

DSS, see Digital Signature Standard

Dugger, Ronnie, 173

Dumpster diving, 113

Earnest, Les, 320

Eavesdropping, 100, 113

Edison, Thomas Alva, 183

Editor risks, 192

Edwards, David L., 322

Effects of risks, 7, 120-131

Eggert, Paul, 90

Eiffel (programming language), 237

Einstein, Albert, 221

Elections

constraints, 243-253

risks, 171-174

Electra, 220

Electrical power problems, 74-85

Electrocution by heart monitor, 70

Elevator accidents

in Ottawa, 62

Emanations, 113

Emergency dispatch problems, 72

Emerson, Ralph Waldo, 304

Encapsulation, 235, 240

in Clark-Wilson, 242

flaws in, 107

Encryption

public-key, 348

for authentication, 111

for key distribution, 212

shared-key, 349

distribution, 212

Epson America, 187

Equifax

data misused, 187

Lotus Marketplace, 182

Errors, 12

Escape completion, 179

Escrowed Encryption Standard, 280

Esparza, Fernando M., 324

Estelle, 236

Estrin, Debbie, 190

Ethernet promiscuous mode, 211

Ethics, 273-276, 284

Euclid, Real-Time, 236

Evaluation during development, 237

Evolution, 6, 238

security implications, 239

Exxon Valdez, 59, 265, 268

F-16

deadlock detected, 39

flip-over detected, 38

flip-over, 219

stall, 267

F-18

missile clamped, 38

missing exception, 38, 287

F-111

over Libya, 37

Failures, 12

critical, 12

The Falcon and the Snowman, 153

Falklands War

helicopter lost, 37

Fault tolerance, 212, 228. See also Table 7.2, 231

hierarchical, 231

techniques, 227-231

virtualized, 241

Faults, 12

Features, 346

Ferlinghetti, Lawrence, 181

Finalization in programming, 236

Financial losses

accidental, 169-171

ATM overgenerosity, 170

Bank of New York, 169

Federal Reserve

duplicates transactions, 170

transfer off by factor of 1000, 170

German bank duplicates transfers, 170

intentional, 165-169

late lottery tickets, 170

racetrack malfunction, 170

Sri Lankan rupees, 169

UK bank duplicates transfers, 170

finger, 107, 127, 211

Fire

Dreyers Ice Cream, 164

Hinsdale, IL, 164

Flaws

authentication, 107

bypass, 105

encapsulation, 107

finalization, 106

initialization, 106

logic, 108

naming, 107

in password mechanisms, 108

sequencing, 107

termination, 106

trapdoor, 105

validation, 107

Floating-point accuracy, 93

Flood

Colorado River, 220

Hinsdale, IL, 164

flushot, 141

Fokker F.100, 43

Ford, Daniel F.

The Button, 38

Three Mile Island, 321

Ford, Gerald

media interference, 161

Formal methods, 225

in consistency proofs, 237

Formality, 346

FORTRAN

DO loop in Mercury, 27

in German, 93

Fostel, Gary, 282

Foster, Neil (both), 195

Fox, Joseph M., 318

Franklin, William Randolph, 322

Fraud

ATM, 165

attempted

ATM card counterfeiting, 168

Belgian BNP, 166

Dutch bank, 168

First Interstate of California, 167

First National of Chicago, 166

Harrah’s, 167

attempted

Pennsylvania lottery, 167

Prague, 166

Union Bank of Switzerland, 167

financial, 165-169

password misused, 166

Pinkerton’s, 167

Volkswagen, 165

voting, 172

Freud, Sigmund, 327

Friendly fire

Black Hawks shot down, 35

Galileo, 30

Gall, John, 316

Gaps

role in privacy, 189

social, 99, 100

sociotechnical, 99

technological, 98, 99

Garman, Jack

first shuttle, 20

Gasser, Morrie

distributed systems, 325

secure systems, 325

Gateways, 346

accessibility, 214

Gegg, Nicholas, 320

Gemini V, 27, 121

gets, 107, 133

Ghosts

planes, 48

trains, 55

Giraffe deaths, 157

Golde, Roger A., 278

Gorbachev, Mikhail, 186, 279

Goun, Roger H., 90

Gp 1 virus, 141

Graf, Steffi, 132

Graham, Malcolm, 191

Greenberg, Ira, 320

Greenfield, Gerald Harvey, 165

Greenhalgh, Gary L., 325

Grind, shutdown, 157

Gripen, 36

Groups of users, 99

Groves, Mark, 318

Guards, 346

Gumbel, Bryant, 186

Hamming distance, 229

Handley-Page Victor

tailplane flutter analysis, 122, 220

Handwriting recognition, 207

Hardie, Doug, 173

Harrah’s Tahoe scam, 167

Hartford Civic Center roof collapse, 221

Harvard Mark I wiring, 93, 125

Health problems, 68-73

summary, 73

Heisenberg phenomenon, 263, 290

Hellman, Martin, 331

Herbison, B.J., 321

Hess, Markus, 134

Hibbert, Chris, 327

Hierarchical structure

layering of abstractions, 203, 240

Hoffman, Lance, 323

Hoffman, Rodney, 328

Holbrook, Paul, 321

Horning, James, 310

BRAVO, 206

Electra, 221

Grapevine, 215

Star Wars, 214

Horsfall, Dave, 164

Hubble Space Telescope, 204

Huth, Mark, 324

Hyphenation risks, 192

Identification, 211, 346

flaws, 106

universal, 199

IFF transponder, 36

Ilieve, Peter, 322

Illuminatus, unnamed, 326

Implementation, 346

failures due to, 262

sometimes an afterthought, 236

use of higher-level languages, 225

Inaction, 113

Incremental closure, following system changes, 239

Indian Airlines, 45

Inference, 112

on page fault activity, 109

salary example, 179

Information hiding, 240

lack of, 107

Information superhighway, 299

questions, 302

INFOSEC, 346

Inheritance, 235

Initialization

flaws, 106

in programming, 236

Integrity, 2, 97

loss of, in communications, 211

problems, 132-180

Intel 486 flaw, 93

Intelsat 6, 24

Intent of misuse, 126

confused in policies and laws, 99

Intentional misuse, 126

Interfaces, 206-209

Interference, 100, 128

affecting Japanese robots, 65, 162

Atlas-Centaur, 159

automobile microprocessors, 162

Black Hawk, 158

Challenger communications, 159

clocks, 162

examples, 158

garage doors, 161

hospital alarms, 71

hospital ICU, 161

Johnny Carson, 162

kills miner, 160

McDonald’s clocks, 160

miscellaneous cases, 163

nuclear power, 161

pacemakers, 70, 161

scoreboard clock, 163

Sheffield, 158

Skylab, 159

tape drives, 162

theater

A Chorus Line, 161

Sunset Boulevard, 162

Tomahawk, 158

Internet, 346

Internet Worm, 106, 107, 127, 211

Irland, Edwin A., 215

Isolation, 240

ITSEC, 346

Jackson, Shirley, 195

Jacky, Jon, 319, 320, 321

Jaffe, Matt

Aegis, 35

Jail problems, 174-176

Jalali, Caveh, 215

Johnson, Deborah, 330

Johnson, Jeff, 182

Jones, Douglas W., 91

Jones, Shirley (both), 196

Joyce, Edward, 317, 321

Jung, Carl G., 203

Jurassic Park, 142

Kamens, Jonathan, 215

Karger, Paul, 242

Keefe, Bill, 320

Kegel, Ted, 149

Keys

private, 347

public, 348

shared, 349

Kipling, Rudyard

The Iron Ring, 282

Klein, Dan, 163

Klossner, Andrew, 175

Knight, John, 89, 90

Korean Air Lines 007, 47

Lack, G.M., 90

Ladkin, Peter, 46

Laing, R.D., 294

Lamport, Leslie, 209

Buridan’s Ass, 39

Lampson, Butler

distributed system authentication, 325

reliable memory protection, 323

Landau, Susan, 188

Landsat 6, 30

Lanford, W.A., 159

Lao Tse, 203, 216

Lauda Air 767, 44

Lauffenberger, Michael John, 139

Laws, 275

Layering, 240

Clark-Wilson applications, 242

Leading Edge, 141

Leap-year problems, 90

Least common mechanism, 240

Lee, T.M.P., 242

Lehenbauer, Karl, 26

Les Miserables, shutdown, 157

Letter bombs, 346

Letterman, Art, 183

Leveson, Nancy G.

Crystal River reactor, 321

Pacemaker, 71

Safeware, 316

software safety, 329

Therac-25, 68

Levine, Leonard P.

Computer Privacy Digest, 315

Lewis, Anthony, 264

Lewis, Donald R., 139

Leyland, Paul, 324

Library shutdowns, 158

Lightning

launches rockets, 160

strikes twice, 160

Logic bombs, 103, 346

Logic flaws, 108

Login

remote, 110, 211

trapdoor, 110

universal, 110

London Ambulance Service, 72

London Stock Exchange Taurus, 216

Londono, William, 174

Lotus Marketplace, 182

Lufthansa, 46

Ma, Yo-Yo, 142

MacInTax, 191

Maintenance

failures due to, 262

needs, 238

security implications, 239

Management

of developments, 238

of system build, 238

Mander, Jerry

aphorisms, 304

Failure of Technology, 316

Television, 301

Mariner I, 26, 121

Markoff, John, 323

Mars Observer, 29

Marshall, Lindsay, 163

Martens, Wilfried, 186

Masquerading, 113

Massey, Walter, 277

Master-password trapdoor, 115, 237

MasterNet, 216

Mayer, Ken, 78

Mazlov, Anatoly, 78

McLeod, John, 88

McMahon, James, 140

Mediation, 346

Medical information, erroneous, 71

Mellor, Peter, 53, 292, 319

Mercuri, Rebecca, 325

trust, 264

virtual reality, 221

Mercury, 237

DO I=1.10, 27, 237

monkey business, 288

reentry, 21

Message digesting, 346

Michaelson, George, 319

Michelangelo virus, 141

Mills, Harlan, 331

Milnet, 127, 346

Minow, Martin, 159

Misrepresentation, 113

Missiles, aiming problems, 38

Misuse

accidental, 126

of acquired rights, 105

by authorized users, 214

bypass of authorization, 100

deferred, 100

eavesdropping, 100

external, 112

of hardware, 113

intentional, 126, 132-144

interference, 100

of maintenance facilities, 128

masquerading, 100

penetrations, 214

pest programs, 100

of resources, 100, 111

techniques

summarized in Table 3.1, 102

unintentional, 144-145

Mitnick, Kevin, 136

MLI, 346, 347. See also Multilevel integrity

MLS, 346, 347. See also Multilevel security

Modeling, 219

failures due to, 262

Models, 346

Modula-2+, 236

Modula-3, 236

object-oriented, 237

Molenaar, Paul, 325

Monitor burnout, 158

Monitoring, 213, 347

Monkey

in 747 cockpit, 288

Cosmos, 288

Mercury-Atlas, 288

Moore, Edward F., 329

Morris, Bob

dictionary attacks, 109, 143

interconnectivity, 299

Morris, Noel, CTSS, 155

Morris, Robert Tappan, 133

Motor vehicle database misuse, 184

Mullender, Sape, 325

Multics, 347

access control, 99

Multilevel integrity, 225, 226, 243

property, 243

TCB, 243

Multilevel security, 225, 226, 240

property, 240

TCB, 243

Multiprocessing, 104

Mumford, Lewis, 305

Murphy’s Law, 12, 286

Murray, W.H., 215

Mutual authentication, 212

n-version programming, 124

Nader, Ralph

Collision Course, 316

Nagle, John B., 158

Naming

aliases, 107

in correspondence, 198

flaws, 107

problems, 194-200

spoofing, 110

National Crime Information Center (NCIC), 182

National Information Infrastructure, 299

National Institute of Standards and Technology (NIST), 331

Nationwide Electronic Tracking, 185

Navratilova, Martina, 132

NCSC, 347

Nelson, Rep. William, 22

Network

virtualized, 241

weaving, 113

Neumann, Helen K., 285

Nike Orion, 28

Nilsson, Erik, 183

Noncompromisibility, 347

of TCBs, 240

Nondeterminism in critical race conditions, 107

Nonrepudiation, 212, 347

Nontamperability, 347

NORAD

false alerts, 38

software modernization, 218

Norman, Donald A., 330

naming, 198

North, Oliver, 186

Northwest Airlines crash, 44, 220, 266

Nuclear power

9-Mile Point, 82

Bruce, 81

Chernobyl, 77

Crystal River, FL, 80

Davis-Besse, 76, 122

French, 81

Grenoble, 81

interference, 161

Lithuania, 82

NRC regulations, 78

simulation, 79

Sizewell B, 80

Soviet Navy submarine problems, 76

Soviet Union, 78

summary of early cases, 74

Three Mile Island, 75, 122

United Kingdom, 81

Nuclear submarines

Soviet Navy problems, 76

O’Connor, Ann Marie, 196

O’Connor, Anne Marie, 196

Object-oriented paradigm, 235, 237

abstraction, 235

encapsulation, 235

inheritance, 235

MLS databases, 237

polymorphism, 235

Objects, abstract, 242

Oklahoma compensation system, 217

Olympic Stadium roof tears, 62

Operating systems, 210, 347

hangup flaw, 107

Operation, anticipated in design, 238

OPSEC, 347

Optimization, 213

effects on code-spec consistency, 237

effects on requirements, 241

Orange Book, 347

Osgood, Charles, 195

Osprey, 37

Ovid, 1, 307

Ozols, Aldis, 279

Ozone layer

data lost, 289

depletion ignored, 267, 288

Pace, Alan Scott, 165

Page, Stephen, 319

Papert, Seymour, 331

Parker, Donn B.

computer crime, 323

ethics, 330

Parnas, David L.

documentation, 240

hierarchies, 240

specification, 240

Parnas, Lillian Chik, 188

Passwords

attacks, 103, 127

bypassed by trapdoors, 109

capture, 109, 211

compromise by compiler Trojan horse, 115

derivation, 109

encrypted in Unix, 109, 127, 133

file unprotected against writing, 110

flaws in mechanisms, 108

guessable, 108

nonatomic checking, 110

unencrypted, 109

universal, 109

vulnerabilities, 108, 127

Patriot, 124, 234

clock drift, 34, 237

Paul, James H., 328

Penetration of telephone network controls, 129

Pentagon DP system upgrade, 217

People, failures due to, 262

Pereira, Fernando, 317

Performance, very high, 213

Perrow, Charles, 5, 330

Normal Accidents, 316

Personal identification numbers, 165

Pest programs, 103-105, 347

Peterson, Ivars, 316

Petroski, Henry, 263, 269, 297, 316

Pfleeger, Charles, 325

Phaedrus, 285

Philhower, Robert, 297

Phobos 1, 29, 121, 156, 239

Phobos 2, 29, 156

Pig-Farm spoof, 146

Piggybacking, 113

in TENEX, 107

of up-links, 128

Pinkerton scammed, 167

PINs, see Personal identification numbers

Pirate TV, 153

Pirsig, Robert M., 285

Pistritto, Joe, 320

Playbacks, 113

Playboy channel interruptus, 154

Policy, 347

Pollyanna attitude, 296

Polymorphism, 235

Popp, Joseph, 141

Postol, Ted, 34, 286

Power problems, 74-85

Chicago flood, 84

earthquake side-effects, 83

Northeast U.S. blackout, 83

Ottawa blackout, 83

raccoon, Utah, 85

squirrel, 84

summary, 86

West coast blackout, 83

Principles

of design, 240

object-oriented, 235

for software engineering, 244

Prison problems, 174-176

Privacy

enforcement, 188-189

needs for, 181-183

problems, 181-202

summary of problems, 201

violations, 183-188

Privacy Digests, 315

Private keys, 347

Privileges

exceptions to, in requirements, 234

minimum, 225, 238

mishandling of exceptions, 238

separation of, 225

Process, 348

daemon, 212

Proctor & Gamble, 187

Programming languages

choice, 236

discipline in use, 236

Promiscuous mode in Ethernet, 211

Propagation of access rights, 99

Protocols

communication, 235

synchronization, 235

Proxmire, Senator William, 264

Public keys, 348

Public-key encryption

for authentication, 111

for key distribution, 212

Puget Sound ferry system, 58

Quayle, Dan, 186

Queen Elizabeth II hits shoal, 58

Race conditions

critical, 108

noncritical, 108

Radiation

effects, 71

overdoses

Sagitar-35, 70

Therac-25, 68

underdoses, 70

Railroad problems, 50-57

BART outages, 54

Berlin, 51

British Rail

leaves on track, 54

Severn Tunnel, 54

signaling bug, 52

Canada, 51

Chinese accident, 51

Japan, 51

London

Cannon Street, 52

Clapham Junction, 52

Docklands Light Railway, 52

Island Gardens, 52

London Underground

doors remain open, 53

driverless, 53

man caught in door, 53

wrong-way train, 53

San Francisco Muni Metro

crash, 55

ghost trains, 55, 287

Southern Pacific, 51

summary, 57

Sydney monorail outage, 56

train rolls 25 miles, 54

Randell, Brian, 88, 170

Randolph, General Bernard, 218

Ranzenbach, Edward, 161

Ravin, Ed, 87

Reagan, Ronald

plane interferes, 161

SDI, 264

Real-time

auditing, 213

programming languages

Estelle, 236

Euclid, 236

Reconfiguration

flaws introduced, 106

security risks, 239

Recovery, 213

backward, 228

forward, 228

Red Book, 348

Redundancy

dual, 328

inadequate, 211

TMR with voting, 328

Reference monitors, 348

Reid, Steven (both), 195

Reinsurance loop, 288

Reliability, 2

problems, 12-95

techniques, 227-231

Remote procedure calls, 240

Replay attacks, 211

Replication, virtualized, 241

Requirements, 348

critical, 3

definition of, 233

failures due to, 262

Residues, 106

examples, 145

Resources

misuse, 111-112

virtualized, 240

Restaurant computers, 193

.rhosts, 106, 127, 211

Richmond utility system, 216

RISC, 117

Rising Sun, 142

Risks, 2, 348

analysis, 255-257

assessment, 294-296

effects, 7

in the information infrastructure, 299

inherent in technology, 304

numerical summary, 309

sources, 5

Risks Forum

dates of volumes, 313

information, 314

Rivest, Ron, 331

Rivest-Shamir-Adleman (RSA) algorithm, 254, 348

attacks, 114

Roberson, Walter, 320

Robertson, Joseph O., 194

Robichaux, Paul, 317

Robotics

accidents, 64-67

Budd Company, 67

Connie Chung disappears, 66

deaths in Japan, 65

die-caster killed in Michigan, 65

electrician killed, 66

hospital aide stumbles, 66

Mt. Erebus exploration, 67

safety, 64-67

safety

incidents, 66

system problems, summary, 67

waiter runs amok, 66

Rogan, Terry Dean, 194

Roller-coaster problems, 56, 163

Rose Bowl spoof, 149

Rose, Leonard, 135

Rosen, Eric

1980 ARPAnet collapse, 13

Rosenberg, Ronni, 182, 276

Rotenberg, Marc

privacy, 181

RPCs, see Remote procedure calls

RSA, see Rivest-Shamir-Adleman algorithm

rsh, 110

Rumrill, Clinton, 195

SAC, 38

Safety, 97, 346

control systems, 60-67

medical problems, 68-73

summary, 73

problems, 12-95

robotic systems, 64-67

Salt Lake City

roof collapse, 221

Saltman, Roy, 247, 325

Sandza, Richard, 137

Satellite Tracking Control Facility, 218

Scavenging

logical, 113

physical, 113

Schach, Stephen R., 329

Schaeffer, Rebecca, 184, 201

Scorpion, 38

Scott, Peter, 157, 322

Secrecy, 96

Secret keys, 348

cryptosystem, 348

Security, 2, 349

problems, 132-180

summary, 177

vulnerabilities, 96-119

Seeley, Donn, 320

Seldon, Hari, psychohistory, 257

SEN, see Software Engineering Notes

sendmail debug option, 106, 127, 133, 211

Seneca, 261

Separation

of concerns, 240

of duties, 240, 349

Sequencing flaws, 107

Servers

authentication, 212

distributed authentication problems, 111

problems, 212

file, 210

Shafer, Mary, 193

Shannon, Claude E., 329

Shared keys, 349

encryption, 212, 349

Sheffield jammed, 158

Shimomura, Tsutomu, 91

Ship

ballast-tank control problem, 59

problems, 58-60

summary, 60

runs into a reef, 59

Shockley, William, 242

Shuttle

41-G (Challenger) communications, 159

51-D (Discovery) landing gear, 124

Atlantis

STS-30 repairs, 23

STS-36 launch delay, 24

Challenger

41-G communications, 159

STS-6 software flaw, 21

STS-19 thermocouple, 22, 299

STS-25 explosion, 23

Columbia

STS-1 synchronization, 20, 237, 295, 298

STS-2 abort bug, 219

STS-9 solder, 21, 123, 298

STS-24 oxygen, 22, 299

STS-55 valve, 25

STS-58 glitch, 25

Discovery

51-D landing gear, 124

STS-18 laser experiment, 206, 299

STS-20 backup, 22

STS-26 software exposure, 144

STS-41 error, 24

STS-56 sensor, 24

Endeavour

STS-49 rendezvous, 24, 299

STS-61 Hubble repairs, 204

redundancy in, 328

Sicherman, George, 320

Siege, Scott, 193

Signatures, digital, 349

Simon, Gregory C., 328

Simons, Barbara, 302

Simpson, Homer, 186

Simula, 237

Simulation, 219-221

failures due to, 262

SKIPJACK encryption algorithm, 187, 280

Sklar, Richard, 195

Skylab, 159

Slone, Tom, 67

Smalltalk, 237

Smart cards, 349

Smith, Jennifer, 325

Social responsibility, 276-278

Software engineering, 231-242

benefits, 240

practice, 232-242

principles, 240

view of Clark-Wilson, 242

Software Engineering Notes

RISKS archives, 308

table of issue numbers, 313

Sommer, Judi, 190

Sorber, Russell, 282

Soyuz, 26

Space problems, 19-33

summary, 32

Spafford, Eugene

ethics, 273

spoofed, 146

technoterrorism, 215

Specification, 349

Speech recognition, 207

Speierman, Kermith, 299

Spelling corrector risks, 192

Spoofing, 145-153, 349

of E-mail, 145

with masquerading, 106

of network controls, 129

of satellite TV, 153

of up-links, 128

used defensively, 153

Cadsoft, 153

Continental Cablevision, 153

Sprite, file server recovery, 328

Spy taps, 113

Spying, 112

Squirrel

Providence power surge, 84

SRI power outages, 84

Star Wars (SDI), 31, 215, 233, 267, 295

Starman, Faye, 191

Stars and Stripes simulation glitch, 221

State machine, 349

States, 349

Stevens, Ray Todd, 172

Stokes, Don, 88

Stoll, Cliff, Wily Hackers, 134

Stoned III virus, 141

Stopera doors fail, 157

Stossier, Sheila Jackson, 195

Stover, Teresa, 196

Strassmann, Steve, 322

Stress problems, 71

Strigini, Lorenzo, 173

Strip-mining violators, 217

Stroud, Robert, 157

Subjects, partially trusted, 243

Submarine

hits trawler, 59

Scorpion, 38

Soviet nuclear problems, 76

Thresher, 318

Subversion, 349

Sun SPARC division flaw, 116

Sunset Boulevard sets move, 162

Sunspots affect Quebec, 161

Superuser misuse, 111

Surrogate for a user, 211

Survivability, 97

Swasy, Alecia, 187

Systems, 349

design, 234

development problems, 6

engineering, 232-242

operational problems, 6

view of risks, 257-259

viewpoint, 203-206

Talbott, Steve, 316, 331

Tampering, 350

Tandem

CLX clocks, 88

NonStop systems, 328

Tanenbaum, Andrew S., 329

Taurus (London Stock Exchange), 216

Taylor, James Edward (both), 196

TCB, see Trusted computing base

TCSEC, see Trusted Computer Security Evaluation Criteria

Technology, risks in, 304-306

Telephone system

ATC problems, 17

backup battery, 16

cable cuts

Chicago, 15

New York, 16

Sprint fiber-optic, 16

Virginia, 16

clock problem, 16

fraud, 135

cellular, 136

problems, 14, 121

recovery bug, 15

SS-7 bug, 16

TENEX, 350

hangup flaw, 107

password flaw, 109

term, 88

Terminals

physically controlled, 117

Termination flaws, 106

Terminus, 135

Testing, failures due to, 262

Theater

interference

A Chorus Line, 161

Sunset Boulevard, 162

shutdowns

Grind, 157

Les Miserables, 157

The Who’s Tommy, 157

Therac-25, 68

misplaced trust, 266

nonatomic transactions, 208

Thomas, Martyn, 282, 283, 322

Thompson, Kenneth L.

C-compiler Trojan horse, 110, 248

dictionary attacks, 109, 143

Turing Address, 172

Threats, 2, 350

covert channels, 129

general, 210

in telephone switching, 127

Three Mile Island

indicators, 267

Time bombs, 103, 350

Time-of-check to time-of-use, 108

Timeliness, 97

Titan III

34-D loss, 28

Intelsat 6 launch, 24

Titan IV losses, 28, 219

Tobis, Michael, 304

TOCTTOU, see Time-of-check to time-of-use

Token authenticators, 350

Tomahawk, 158

Tomblin, Paul, 282

Topaz, 124

Tornado (fighter), 37

Toronto SkyDome, roof problem, 62

Toronto Stock Exchange, 122

Toxic leak, Union Carbide, 61

Tozer, Graeme, 319

Traffic analysis, 112

Transactions

atomic, 108

in Clark-Wilson, 242

nonatomic, 208

Trapdoors, 103, 129, 350

in access control, 105

attacks, 105, 108

summarized in Table 3.2, 106

bypassing passwords, 109

in memory reads, 109

Trojan horses, 103, 129, 211, 350

Trout, Michael, 319

Truesdell, Clifford, 331

Trust, 98, 350

engineering, 238

in people, 263

in systems, 263

misplaced, 265

Trusted Computer Security Evaluation Criteria (TCSEC), 233, 350

Trusted computing base, 226, 350

and software engineering, 240

Trusted guards, 350

Trusted systems, 350

Trustworthiness, 98, 270, 350

of people, 210

of systems, 210

TRW credit privacy violations, 187

Ts’o, Theodore, 281

Tseng, Jymmi C., 51

Turner, Clark

Therac-25, 68

Two-phase commits, 328

Types, strong, 236, 240

Unexpected events, 286-291

Union Carbide, toxic leak, 61

Unix, 109, 350

Berkeley, 127

Untrustworthiness, 210

of communications, 211

of systems, 210

of users, 211

Upward, Antony, 321

User surrogates, 211

Vaccines, 350

Validation flaws, 107

Values, 273-276

van Beek, Piet, 320

van der Meulen, Meine, 320

van Oostrum, Piet, 157

van Vleck, Tom, CTSS, 155

van Wyk, Ken, VIRUS-L, 315

Vietnam Memorial, 190

Viking, 29

Vincennes, 35, 207

Virginia child-support system, 216

Virtualization, 225

of concurrency, 241

impact of, 244

of locations, 240

of networking, 241

of recovery, 241

of remoteness, 241

of replication, 241

of resources, 240

of transactions, 241

VIRUS-L Digest, 315

Viruses, 103, 211, 350

personal-computer, 105, 140, 323

polymorphic, 140

stealth, 140

strict-sense, 104

Voges, Udo, 170

Volkswagen fraud, 165

von Neumann, John, 329

von Rospach, Chuq (Spafford spoof), 146

Voting

challenges, 259

constraints, 243-253

errors, 171

fraud, 172

risks, 171-174

Vulnerabilities, 1, 351

avoidance of, 117-118

master-password attack, 115

in password mechanisms, 108

security, 98-103

Trojan horse attack, 115

WAIS, see Wide Area Information Server

Wallet blows out train window, 291

Wallops Island rockets, 160

Ware, Willis, 181

WarGames, 264

Water mains rupture in Fresno, 63

Waterfall model, 218

Weak links, 120, 291-294

DC-10 alarm power, 266

effects on development, 232

erroneous assumptions, 241

multiple, 130

in security and reliability, 117

Weatherley, Rhys, 90

Webber, Sir Anthony Lloyd, 162

Weber-Wulff, Debora, 52, 89, 322

Weingarten, Rick, 276

Weinstein, Lauren

Privacy Forum Digest, 315

RISKS by FAX, 314

Weinstock, Chuck, 158

Weisman, Bill, 325

Weissman, Clark, 280

Whitcomb, Coralee, 182

Whitehead, Alfred North, 221

Whitehouse, John H., 281, 283

Whiteley, Nicholas, 135

Whole Earth Review

on technology, 331

Wide Area Information Server, 314

Wiederhold, Gio, 324

Wiener, Lauren, 316

Williams, Ted, 149

Wittman, Richard G., 135

Wollongong misuse, 135

Workstations, 210, 241

World-Wide Military Command and Control Systems (WWMCCS)

false alarms, 38

Worms, 103, 104, 351

attacks, 351

constructive, 104

Shoch-Hupp, 104

Internet, 211. See also Internet Worm

malicious, 104

Wright, Gary, 319

Yellow Book, 351

Ziegler, J.F., 159

Zinn, Herbert, 136

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.144.69