Thank you for correcting the text in this article. Your corrections improve Papers Past searches for everyone. See the latest corrections.

This article contains searchable text which was automatically generated and may contain errors. Join the community and correct any errors you spot to help us improve Papers Past.

Article image
Article image
Article image
Article image
Article image
Article image

The vulnerable computer

Computer Crime. By Gerald McKnight. Michael Joseph. 221 pp. with good index. Mr McKnight’s intention is to warn of what may, and, in his opinion, surely will happen because many owning and operating computers are not sufficiently aware of the need for very costly security measures. That is natural enough, for computers are so very expensive to buy, and why spend a lot more when all is going ahead safely. Mr McKnight asks, “now do you know all is safe?” He gives case after case where very large sums indeed have been stolen through fraudulent manipulation of computers and the frauds have been discovered only by outside accident. Can you therefore be sure of your security measures? If an unauthorised person can gain access to a firm’s computer he has the key to the safe, is one of the main themes of the book; therefore those who are there by right

should be the right people, and the greatest care should be taken to keep all others away. Apart from thieves’ interference with a computer, with consequent loss and chaos, meddling can be carried out by an employee with a grudge, or by “Luddite” attack from those who fear the machine; by people engaged in commercial espionage, or by accident if the machine is not securely protected against the rare and unexpected catastrophe. There is practical certainty that attack will be made in force by organised crime either through stealing on a grand scale or by blackmail levied against possible destruction. This last could, and in the opinion of the author will, be made use of bv ideological fanatics. Nobody foresaw the use that would be made in hijacking of aeroplanes, and attacks upon computers will be of like character. This book is a must for the business world and for all interested in crime prevention. It is careful not to give detailed blue-prints to the criminally inclined. An Irish riot Islands 6. Summer, 1973. Edited and published by Robin Dudding. 112 pp. “Grandfather’s Irish Riot,” Elsie Locke's account of an Irish Fenianinspired showdown near Westport in 1868, is the highlight of this new issue; it apparently began as an attempt to trace her grandfather, and the result is a highly interesting record of a very colourful incident. The issue also contains two articles on Frank Sargeson (by Kevin Cunningham and Lauris Edmond), art criticism by Michael Dunn and Quentin Macfarlane (on David Graham), an interesting piece by Dennis McEldowney about Eileen Duggan, some translations of Maori poetry by Margaret Orbell, and some good poetry’ by several young writers: Wedde, Arvidson, Olds, McLaren, Haley, and Manhire. Jack Body’s '‘Diary of a School Music Teacher” is appallingly badly-written, as is Owen Leeming’s 24-page autobiographical piece which ends with a bad mis-quote from “The Press.”

Permanent link to this item

https://paperspast.natlib.govt.nz/newspapers/CHP19740209.2.54.5

Bibliographic details

Press, Volume CXIV, Issue 33455, 9 February 1974, Page 7

Word Count
466

The vulnerable computer Press, Volume CXIV, Issue 33455, 9 February 1974, Page 7

The vulnerable computer Press, Volume CXIV, Issue 33455, 9 February 1974, Page 7

Help

Log in or create a Papers Past website account

Use your Papers Past website account to correct newspaper text.

By creating and using this account you agree to our terms of use.

Log in with RealMe®

If you’ve used a RealMe login somewhere else, you can use it here too. If you don’t already have a username and password, just click Log in and you can choose to create one.


Log in again to continue your work

Your session has expired.

Log in again with RealMe®


Alert