Consideration of Targeted Hostile Software in Homeland Security by Peter V. Radatti, Ph.D....
-
Upload
sydney-lane -
Category
Documents
-
view
217 -
download
0
Transcript of Consideration of Targeted Hostile Software in Homeland Security by Peter V. Radatti, Ph.D....
Consideration of Targeted Hostile Software in Homeland Security
byPeter V. Radatti, Ph.D.
Distinguished Visiting Research ProfessorFlorida Institute of Technology
University Collage 150 West University Blvd., Melbourne, FL 32901 USAwww.fit.edu
CEO/PresidentCyberSoft Operating Corporation
1508 Butler Pike, Conshohocken, PA 19428 USA+1 610-825-4748 * [email protected]
www.cybersoft.com
© Copyright April 2006 by Peter V. Radatti
Radatti’s Rules of Computer Security
1. Computer Security Failure Costs2. Outcome of Financial Costs Always Higher
Than Anticipated3. Common Security Solution Problems4. Networks5. Computer Security Intrusion6. Computer Security Performance7. Security Vigilance8. Security Cost/Effectiveness9. Security Design10. Requirements for Great Security11. Locks12. Who is Available on Both Sides?
Radatti’s Factors of Computer Security
1. Attacks2. Attack Planning3. User Actions4. System Readiness5. The Unexpected