Computers and Security, Vol. 7, No. 4
afflicted with design omissions which make responsible data ownership impossible. This is quickly becoming a crisis because so many organisations have become so dependent on personal computing technology while ignoring the issue o f data ownership. Government regulations are sensitising some organisations to this issue. Others have been rudely awakened to the consequences o f mismanaging information assets by employee and competitor data theft and abuse. Computer Control
Quarterly, Spring 1988, pp. IO-IZ Insurance and the Hacker, David Davies. This article discusses some different, but important, aspects of hacking or illegal intrusion. These include the possible losses involved and how insurance may assist in recovering some o f these losses. Although the article has been written for the U.K. environment, it makes some useful general points.
Computer Control Quarterly, Spring 1988, pp. 28-30. Can We Trust Computers?, Andrew M. Lister. Computers have been responsible for some spectacular failures--for example, the loss o f a space probe, the leakage of 150 000 litres of radioactive water, and a 50% error in the Vancouver stock exchange index. Computers have also been responsible for countless mundane irritations such as erroneous bills and inoperative cash dispensers. Since computers are increasingly used in critical applications, it is no longer acceptable that software is riddled with "bugs". New developments, for example, in expert systems and distributed computing may exacerbate the problem rather than ease it. This article addresses these issues and indicates how the dis-
cipline of computer science may offer a solution. Computer Control
Quarterly, Spring 1988, pp. 31-35. Media Security, Ralph M. Smole. Corporate and government espionage seems to be on the rise, and the loss of a few sheets of data, a reel of tape, or a floppy disk could cost hundreds or thousands ofdolhrs. This article discusses some of the present technologies available to minimise such losses. Computer
Control Quarterly, Spring 1988, pp. 36-37.
Corn puter Viruses Mac Virus Surfaces in Washington, Nick Arnett. A Macintosh virus surfaced in Washington, infecting machines at NASA as well as at Apple's Washington sales offices and damaging all programs on infected disks. The virus contains "time bombs" that are activated 2, 4, and 7 days after a disk is infected, according to an Apple technician. It does not affect data files but all applications must be deleted in order to remove the virus. Users were urged to write-protect original program disks because the virus manifests itself in many ways, causing printing problems, system crashes, and faulty desk accessory operations, lnfo World, April 11,
I988, pp. I, 3. N e w Virus Damaging Mac Data, Group Says, Scott Mace. A new Macintosh software virus is damaging files and modifying normal programs that come into contact with it. A large Macintosh user group warned that the virus can damage application files and cause user difficulty in using laser printers. The easiest way to spot the virus is by looking at the icons that represent the Note Pad File
and Scrapbook file in the Macintosh System Folder, group officials said. When infected, these icons become a rectangle with a bent comer. The virus transmits itself from Mac to Mac by invading a standard executable application file on a contaminated computer. When this contaminated application is copied to a "sterile" Macintosh and executed, the virus attacks the new system by making changes to the contents of the System Folder. Once the system files on the target Macintosh have been infected, the virus will begin to attack applications, lnfo Worid, April
11, 1988, p. 29. A N a s t y B u g , Editorial. A mini panic is gripping the industry because of computer viruses. These destructive or annoying programs have turned up in everything from IBM's electronic mail network to shrink-wrapped copies of Aldus's Freehand package. MIS should take this latest scare pretty seriously. The specter of attacks striking computers worldwide should concern everyone who operates large systems. That concern should be particularly great in companies involved in layoffs, takeovers and financial crises where damage could be caused by disaffected employees. Software vendors should also take note of their vulnerability. This latest panic may encourage MIS professionals and vendors to exercise greater caution. User education is also in order.
Computerworld, April 4, 1988, p. I8. Security Expert Gives Advice on Computer Viruses, Tim McGraw. Computer viruses were the number one topic at a conference o f the Association for In-
425