DocumentCode :
3065668
Title :
In search of the cuckoo´s nest [computer security]
Author :
Kluepfel, Henry M.
Author_Institution :
Bell Comm. Res., Redbank, NJ, USA
fYear :
1991
fDate :
1-3 Oct 1991
Firstpage :
181
Lastpage :
191
Abstract :
In C. Stoll´s recent book, The Cuckoo´s Egg, he describes the pursuit of a computer hacker who, like the cuckoo, left something in the computing nests of other users. The author offers an auditing perspective to find the vulnerable computer nest which may have some malicious code planted in it by an intruder because of a breakdown in security design or practice of the targeted computing environment nest. He examines the security implications for an increasingly open network architecture, the lessons learned from performing intrusion post-mortems, the need for architecture plans and systems engineering for security, and an audit framework for evaluating security
Keywords :
auditing; computer crime; open systems; architecture plans; audit framework; auditing perspective; computer hacker; computing nests; intruder; intrusion post-mortems; malicious code; open network architecture; security design; security implications; systems engineering; targeted computing environment nest; Books; Computer architecture; Computer hacking; Computer networks; Computer security; Educational institutions; Switching systems; Telecommunication computing; Telecommunication services; Telephony;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 1991. Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on
Conference_Location :
Taipei
Print_ISBN :
0-7803-0120-X
Type :
conf
DOI :
10.1109/CCST.1991.202213
Filename :
202213
Link To Document :
بازگشت