Title :
In search of the cuckoo´s nest [computer security]
Author :
Kluepfel, Henry M.
Author_Institution :
Bell Comm. Res., Redbank, NJ, USA
Abstract :
In C. Stoll´s recent book, The Cuckoo´s Egg, he describes the pursuit of a computer hacker who, like the cuckoo, left something in the computing nests of other users. The author offers an auditing perspective to find the vulnerable computer nest which may have some malicious code planted in it by an intruder because of a breakdown in security design or practice of the targeted computing environment nest. He examines the security implications for an increasingly open network architecture, the lessons learned from performing intrusion post-mortems, the need for architecture plans and systems engineering for security, and an audit framework for evaluating security
Keywords :
auditing; computer crime; open systems; architecture plans; audit framework; auditing perspective; computer hacker; computing nests; intruder; intrusion post-mortems; malicious code; open network architecture; security design; security implications; systems engineering; targeted computing environment nest; Books; Computer architecture; Computer hacking; Computer networks; Computer security; Educational institutions; Switching systems; Telecommunication computing; Telecommunication services; Telephony;
Conference_Titel :
Security Technology, 1991. Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on
Conference_Location :
Taipei
Print_ISBN :
0-7803-0120-X
DOI :
10.1109/CCST.1991.202213