skip to main content
10.1145/1940941.1940967acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Cautionary tales from real world failures for managing security in the cyber world

Published:01 October 2010Publication History

ABSTRACT

Any field of endeavor benefits from a body of knowledge of failures that provide guidance on what to avoid. As a relatively young discipline whose failures can often be handled privately, information security professionals do not have access to the volume of well documented failures for analysis that more mature professions such as mechanical and civil engineering rely on. This paper examines catastrophic failures from the physical world and provides "lessons learned" that can be applied in managing an information systems security program.

References

  1. Clark, C. 1997. Radium Girls: women and industrial health reform. The University of North Carolina Press, Chapel Hill, NC.Google ScholarGoogle Scholar
  2. Dowie, M. 1995. Losing Ground -- American Environmentalism at the Close of the Twentieth Century. The MIT Press, Cambridge, MA.Google ScholarGoogle Scholar
  3. Federal Financial Institutions Examination Council. 2006. Information Security IT Examination Handbook. DOI=http://www.ffiec.gov/ffiecinfobase/booklets/information_security/information_security.pdf.Google ScholarGoogle Scholar
  4. French, F. and Burgess, C. 2007. In the Shadow of the Moon -- A Challenging Journey to Tranquility, 1965--1969. University of Nebraska Press, Lincoln, NE.Google ScholarGoogle Scholar
  5. ISC2. 2008. 2008 Annual Report. DOI = https://www.isc2.org/uploadedFiles/(ISC)2_Public_Content/About_ISC2/2008 annual report electronic.pdf.Google ScholarGoogle Scholar
  6. ISO/IEC JTC 1. 2005. ISO/IEC 17799:2005 Information technology -- Security Techniques -- Code of practice for information security management. The International Organization for Standardization, Switzerland.Google ScholarGoogle Scholar
  7. IT Governance Institute. 2007. COBIT 4.1 -- Framework, Control Objectives, Management Guidelines, Maturity Models. DOI = http://www.isaca.org/Knowledge-Center/cobit/Documents/CobiT_4.1.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Lim, J. 1998. An Engineering Disaster: Therac-25. DOI= http://www.stanford.edu/class/cs181/Materials/therac.pdf.Google ScholarGoogle Scholar
  9. McDonald's. 2010. World Wide Web Home Page. DOI=http://www.mcdonalds.com/us/en/home.html.Google ScholarGoogle Scholar
  10. Petroski, H. 1997. Design Paradigms -- Case Histories of Error and Judgment in Engineering. The Press Syndicate of the University of Cambridge, Cambridge, United Kingdom.Google ScholarGoogle Scholar
  11. Petroski, H. 1999. Remaking the World -- Adventures in Engineering. Vintage Books, New York, NY.Google ScholarGoogle Scholar
  12. Petroski, H. 1985. To Engineer is Human -- The Role of Failure in Successful Design. St. Martin's Press, New York, NY.Google ScholarGoogle Scholar
  13. Rhodes, R. 2008. Arsenals of Folly -- The Making of the Nuclear Arms Race. Vintage Books, New York, NY.Google ScholarGoogle Scholar
  14. Rubin, C. 1994. The Green Crusade -- Rethinking the Roots of Environmentalism. Rowman & Littlefield Publishers, Inc., Lanham, MD.Google ScholarGoogle Scholar
  15. Singh, S. 1999. The Code Book -- The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. Doubleday, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Whittaker, W. 2001. Child Labor in America-History, Policy and Legislative Issue. Novinka Books, Hauppauge, NGoogle ScholarGoogle Scholar

Index Terms

  1. Cautionary tales from real world failures for managing security in the cyber world

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      InfoSecCD '10: 2010 Information Security Curriculum Development Conference
      October 2010
      187 pages
      ISBN:9781450302029
      DOI:10.1145/1940941

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 October 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate18of23submissions,78%
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader