This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
November/December 2011 (vol. 9 no. 6)
pp. 12-13
William Arbaugh, University of Maryland
Deborah A. Frincke, US Department of Defense
All computers today operate in a hostile environment. The only difference between large enterprises, small businesses, governments, and home users is the degree of hostility faced. How we deal with these threats and what we do to improve the situation are vitally important to our future. This issue tackles some of the salient points from how we create these problems ourselves to what we can do to mitigate threats.
Index Terms:
insecurity, remediation, cloud computing, healthcare, collaborative intrusion detection systems, risk management
Citation:
William Arbaugh, Deborah A. Frincke, "Living with Insecurity," IEEE Security & Privacy, vol. 9, no. 6, pp. 12-13, Nov.-Dec. 2011, doi:10.1109/MSP.2011.166
Usage of this product signifies your acceptance of the Terms of Use.