Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
108 Aug 2001 - 00:20PeterThoeny 

Render style:     Context:


 History: r1
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>WebChanges (16 Aug 2001, PeterThoeny?)

200 Recent Changes in CBI_ComputerSecurity Web retrieved at 12:26 (Local)

Statistics for nop CBI ComputerSecurity Web Month: Topic views: Topic saves: File uploads: Most popular topic views: Top contributors for ...
This is a working site for the Charles Babbage Institute's NSF funded project on the history of computer security. You can comment on and contribute to these pages ...
Publication of Computer Security History Workshop (July 2014) CSHW 14 Papers at CSHW 14 were extensively discussed, revised by authors, and submitted to IEEE Annals ...
Cambridge CAP computer The Cambridge CAP computer successfully used security capabilities in both hardware and software. Part of a project on memory protection ...
SYSTEMS: ACF ADEPT 50 (stub) B5000 Blacker Cambridge CAP computer C.mmp/Hydra DEC/VAX/SVS (aka VAX VMM Security Kernel or skvax ...
C.mmp/Hydra C.mmp was a Carnegie Mellon University multiprocessor computer system meant to demonstrate the cost/performance advantages of multiprocessor based computers ...
BLACKER BLACKER was the first wide area computer network security project and only the second or third system of any kind to achieve the top "A1" rating of the ...
PROGRAMS: Carnegie Mellon CERT Commercial Cryptographic Endorsement Program (stub) Common Criteria Computer Security Foundations (workshop ...
Completed Project Interviews: 1 Roger Schell (Interviewed 5/1/2012 Posted) 1 Barry Schrager (Interviewed 5/24/2012 Posted) 1 Rebecca Bace (Interviewed ...
Butler Lampson CBI oral history interview with Butler Lampson Butler W. Lampson is a computer scientist and ACM Turing Award winner who, while best known for ...
Access Control Facility (ACF) ACF was a software security system developed at the University of Illinois by Barry Schrager and Eberhard Klemens. Designed to provide ...
Set GROUP Main.tmisa, Main.lewi0740, Main.odlyzko, Main.gf041368, Main.gx062879, Main.gx063087, Main.gx063348, Main.yostx003, Main.jcortada, LanceHoffman Set ...
GO TO MechanismCanary DRAFT VERSION: A canary is a security mechanism designed to prevent buffer overflow attacks. When a buffer overflow attack occurs, it overwrites ...
Trusted Information Systems Trusted Information Systems (TIS) was a computer security research and development company founded by NSA's Steve Walker in 1983. TIS ...
Tom Van Vleck Tom Van Vleck is a computer software engineer and security expert. Enrolling at the Massachusetts Institute of Technology as a freshman in 1961, Van ...
Project Documents NSF CSP CISE Security 2010 Dec.pdf: NSF Computer Security Project proposal. NSF TC Security 2012 08 31 annual report.pdf: First Year Annual ...
Current Activities Project Documents For the project's original NSF proposal and the annual and final project reports see Project Pages Interviews for 2015 ...
Earl Boebert Nov 1966 Feb 1995 (28 years) Senior Research Fellow Honeywell International Apr 1985 Feb 1995 (10 years) Chief Scientist Secure Computing Corporation ...
Hilda Faust (Mathieu) Hilda Faust (Mathieu) worked on computer security as part of the NSA.(1) (double curly brackets) you must choose Force new ...
Canary (buffer overflow) A canary is a security mechanism designed to prevent buffer overflow attacks. When a buffer overflow attack occurs, it overwrites more memory ...
Triple DES is an encryption standard that describes the Triple Data Encryption Algorithm (TDEA, used interchangeably with TDES), which applies the Data Encryption ...
Dr. Roger R. Schell CBI Oral History Interview with Roger Schell (2012) Dr. Roger R. Schell is a retired U.S. Air Force Colonel who is one of the foremost contributors ...
DEC/VAX/VMS VAX/VMS, now known as OpenVMS (Open Virtual Memory System), is a server operating system that runs on VAX, Alpha, and Itanium based computers. Development ...
MITRE MITRE was founded in 1958 as a not for profit corporation to provide engineering and technical services to the federal government. MITRE's customers in the ...
Biba Model The Biba model (or Biba Integrity Model) was first published in 1975, then revised in 1977, approximately one year after the final MITRE publication of ...
Logic Bomb A Logic Bomb (sometimes also called a time bomb) is a type of malicious code that, once installed, will remain inactive in a computer until it happen that ...
IBM Redbooks The IBM Redbooks publications, started in 1968, are produced by IBM's International Technical Support Organization (ITSO), and are intended for IBM IT ...
Background reading on computer security history (see also "References Cited" in original NSF proposal): Ronald E. Doel Thomas Söderqvist, The Historiography ...
To Do List: Done An archive of the active "To Do List" February 2015: done: Clarify overlapping citations to "Orange Book" / TCSEC / "Rainbow Series" that ...
Computer Security Foundations (workshop and symposium) Computer Security Foundations was created in 1988 as a "workshop" of the IEEE Computer Society Technical Committee ...
pls cut out: pls link to Computer Security Foundations (stub) Hi Patrick: put an "exclamation point" in front of McLean to suppress the wiki link . . . I've ...
Whitfield Diffie Whitfield Diffie, who has a B.S. in mathematics from the Massachusetts Institute of Technology, and an honorary doctorate from the Swiss Federal Institute ...
Jerry Saltzer Jerry Saltzer, who has an Sc. D. in electrical engineering from MIT, is a computer scientist most noted for his contributions to the ring network technology ...
Rainbow Series The "Rainbow Series" was a series of computer security standards and guidelines published during the 1980s and the 1990s. The series was originally ...
DoD 5200.28 (TCSEC) TODO: according to John D. McLean oral history, IBM RACF was going for a C2 cert and got C1. Research and confirm, perhaps gather data on ...
Information System Security Association The Information System Security Association (ISSA) is an international, not for profit organization of information security ...
Steve Walker Steve Walker, who has an MSEE from the University of Maryland College Park, and a BSEE from Northeastern University, is noted for his work on the team ...
Leonard LaPadula Leonard LaPadula, a graduate of engineering at Northeastern University, is a programmer and software engineer best known for co authoring the Bell ...
Fernando J. Corbató Fernando J. Corbató, who has a Ph.D. in Physics from the Massachusetts Institute of Technology, is most noted for his pioneering role in the development ...
David Bell David Bell, who has a Ph.D. in mathematics from Vanderbilt University, is co author of the Bell LaPadula security model, which produced conceptual tools ...
Bell LaPadula David Bell and Leonard LaPadula. Secure Computer System: Unified Exposition and Multics Interpretation . Hanscom AFB, Bedford, MA (1976). This was the ...
First Spam The earliest documented instance of spam, meaning junk email, occurred in early May 1978.(2) It was sent ...
GEMSOS The Gemini Multiprocessing Secure Operating System (GEMSOS) was developed at Gemini Computers in conjunction with its Gemini Trusted Network Processor (GTNP ...
SQL Slammer Worm The SQL Slammer worm (also called the Sapphire worm) was notorious for the speed with which it spread after first being released at 5:30 UTC on January ...
SHARE In August 1955 the RAND Corporation sponsored a meeting of 17 organizations, all of whom had ordered an IBM 704 mainframe computer. RAND aimed to provide a ...
MIS Training Institute The MIS Training Institute, based in the USA, UK, and Asia, conducts training in financial and operational auditing, and in information security ...
Common Criteria The Common Criteria is the computer security evaluation scheme that replaced the 1985 Trusted Computer Security Evaluation Criteria (TCSEC), the DoD ...
Commercial Cryptographic Endorsement Program (CCEP)
Security versus . . . . these topics are works in progress and under construction Artful programming Backwards compatibility Compiled (rather ...
IBM AS/400 (iSeries) The Application System/400 (AS/400) was a "mid range" family of IBM computers meant for small and intermediate sized companies.{{ http://www ...
National Computer Security Conference The National Computer Security Conference (NCSC) began in 1977 and ran annually for 23 years. Initially co sponsored by the ...
Who is who? user name Name Email tmisa Tom Misa tmisa #64;umn.edu jcortada Jim Cortada jcortada #64;umn.edu odlyzko Andrew ...
CISSP (Certified Information Systems Security Professional) Certified Information Systems Security Professional (CISSP) is a certification first granted in 1994 by ...
Computer Security FAQ Why may I access some pages and not others? This wiki has 3 levels of access. Many pages, like the project's home page and many other ...
Workshop (home) Workshop Participants Workshop Papers Workshop Photos Workshop publication
Photos at Computer Security History Workshop (July 2014) CSHW 14 Click on for full screen images. Michael Warner Steve Lipner Jeremy Epstein ...
Participants at Computer Security History Workshop (July 2014) CSHW 14 Workshop participants (left to right). Front row: Thomas Misa, Robert Johnston, Karl Grindal ...
B 5000 The B 5000 was the first large scale computer system developed by the Burroughs Corporation, and is considered one of the "third generation" computers. Released ...
Current Activities Who is Who? People Programs Publications CSHW 2014 Systems Events Mechanisms
Daniel Edwards Daniel Edwards is a former administrator of the MIT AI Lab,{{Steven Levy, Hackers: Heroes of the Computer Revolution , Garden City, New York: Anchor ...
Reference Monitor Introduced in James P. Anderson's 1972 Computer Security Planning Study for the United States Air Force, a reference monitor defines a set of ...
Computer Security Initiative Announced in 1977 under the direction of the Under Secretary of Defense for Research and Engineering, the United States Department of ...
Computer Security Institute Founded in 1974, the Computer Security Institute (CSI) is an educational membership organization for information security professionals ...
Computer Security Conference Timeline This timeline is a representation of the emergence of dedicated computer security conferences between 1974 and 1993. Two general ...
Brewer Nash (Chinese Wall) Model David Brewer and Michael Nash first published the "Chinese Wall Security Policy" in 1989, citing the influence of the Clark Wilson ...
Clark Wilson Model In 1987, David D. Clark and David R. Wilson argued that most models of computer security up to that point had focused on data confidentiality, particularly ...
Trojan Horse A Trojan Horse virus (named after the Greek myth) is a malicious program that on the surface appears legitimate but whose hidden purpose is to implant ...
IBM RACF Introduced in 1976, Resource Access Control Facility (RACF) is an IBM software product that provides access control and auditing functionality for mainframe ...
Peter Neumann Holding doctorates in applied mathematics from Harvard and Darmstadt universities, Peter Neumann (pronounced "NOY man") began working with computers ...
Computer Security Journal The Computer Security Journal was created by the Computer Security Institute and first published in 1981. The journal ran between 1981 and ...
This page generates two outlines based on parent child relationships between the wiki entries / topics. If a topic has an oddly chosen "parent" that relationship ...
ACSAC Classic Papers (www.acsac.org) Login Required to View Attachment Matt Blaze: Key Escrow from a Safe Distance: Looking Back at the Clipper Chip ...
Timesheet Week Starting Mon Tue Wed Thu Fri Sat Sun Total Summary 9/2/2013 H 9 2 5 ...
To Do List Find "Security Models" Chapter for McLean Interview Research and Complete Draft for DES Update First Spam with other possibilities (Find ...
Multics After the implementation of the Compatible Time Sharing System (CTSS) in 1964, Project MAC, an ARPA sponsored MIT research program, began to plan the development ...
nop CBI ComputerSecurity Web Preferences The following settings are web preferences of the CBI ComputerSecurity web. These preferences overwrite the site level ...
Tools for this web Computer Security FAQ NSF Project documents To Do List ...
Supported by the National Science Foundation CNS TC 1116862 "Building an Infrastructure for Computer Security History."
Seymour E. Goodman Seymour Goodman is Professor of International Affairs and Computing at the Georgia Institute of Technology and Co Director of both the Georgia Tech ...
DES 20 Years Later.pdf: DES at 20 session overview DES at 20.doc: Murray DES at 20 session paper
KSOS Ford Aerospace and its SRI International subcontractor originally developed the Kernelized Secure Operating System (KSOS) for the Defense Advanced Research Projects ...
Clark Weissman. "Security controls in the ADEPT 50 time sharing system." In Proceedings of the November 18 20, 1969, fall joint computer conference (AFIPS '69 (Fall ...
Robert "Bob" Johnston Collection of Computer Security Publications appendix to his Computer Security History Workshop (11 12 July 2014) paper (downloaded from his ...
ThomasMisa 21 Jul 2014 1980 09 A Telecommunications Risk Exposure.pdf: "A Telecommunications Risk Exposure" Computer Security (1980) 1981 Spring CSJ ...
DEC/VAX/SVS (aka VAX VMM Security Kernel or SKVAX) The VAX/SVS project was one among several projects seeking to build high assurance operating systems that fulfilled ...
RISOS Paper Robert Abbott, Janet Chin, James Donnelley, William Konigsford, Shigeru Tokubo, and Douglas Webb. "Security Analysis and Enhancement of Computer Operating ...
Incomplete Mediation Incomplete mediation occurs when a computer program leaves sensitive data in an exposed, uncontrolled condition. The vulnerability occurs primarily ...
Walter Tuchman Walter Tuchman is a cryptologist and computer scientist who led the Data Encryption Standard (DES) development team at IBM in the mid 1970s. Tuchman ...
William "Bill" Wulf William "Bill" Wulf is a computer scientist who specializes in the computer security, computer architecture, and the interface between computer ...
Melville Klein Melville Klein (1927 2013) was director of the Defense Department's Computer Security Center from its founding in 1981 until his retirement in 1984 ...
Diffie Hellman Key Exchange The Diffie Hellman key exchange is the basis for public key cryptography, a method that allows two parties to exchange encrypted information ...
Martin E. Hellman Martin Hellman (b. October 2, 1945), currently Professor Emeritus of Electrical Engineering at Stanford University, is best known in the field of ...
Time of Check to Time of Use Error A time of check to time of use error occurs during the lag between the time when an operating system checks to make sure that an ...
Trapdoor A trapdoor is a hidden piece of code within a larger program that that allows the user to perform normally unauthorized actions. The trapdoor code allows ...
NicLewis 20 Feb 2013
Barry Schrager Barry Schrager, who has a M.S. in applied mathematics from Northwestern University, is a seminal figure in the design and development of early computer ...
Rebecca Bace Rebecca Bace, a security technology expert, is the President and CEO of the network security consulting practice, Infidel, Inc. She built her consulting ...
Steve Lipner Steve Lipner, who has an S.B. and an S.M. degree from MIT, where he majored in civil engineering, is the senior director of security engineering strategy ...
Eldon Worley Eldon Worley, a graduate of Oregon State University, worked at IBM for 28 years, and is considered the "father" of the IBM RACF mainframe security product ...
Peter Denning With a B.E.E. from Manhattan College in 1964, and an M.S. and a Ph.D. from MIT in 1968, Peter Denning is a prolific computer scientist, with more than ...
Dorothy Denning With a B.A. and M.A. in mathematics from the University of Michigan, and a Ph.D. in computer science from Purdue, Dorothy Denning is currently a Distinguished ...
Teresa F. Lunt With an M.A. in applied mathematics from Indiana University and an A.B. in geophysics from Princeton, Teresa Lunt is the vice president and director ...
Matthew Bishop Matthew Bishop is a computer security specialist in the Department of Computer Science at the University of California at Davis. After earning his ...
New Directions in Cryptography "New Directions in Cryptography" is the 1976 paper outlining Whitfield Diffie and Martin E. Hellman's key agreement protocol, often ...
RSA Named after the algorithm developers, Ron Rivest, Adi Shamir, and Leonard Adleman, the RSA algorithm was first described in 1977, subsequently earning its discoverers ...
The Codebreakers The Story of Secret Writing (David Kahn) Kahn, David. The Codebreakers: The Story of Secret Writing . New York: Macmillan, 1967. 1164 pp. Revised ...
See also the verbose WebIndex.
Web Security Map This attachment contains a written summary of how permissions and security settings work on the UMN Wiki, and instructions on how to change those ...
Windows NT Originally introduced in 1993, Windows NT is a family of Microsoft operating systems initially borne from Microsoft's collaboration with IBM on its OS/2 ...
VM A Virtual Machine (VM) is a computer that is simulated in hardware or software on another computer. The simulated computer may be the functional representation ...
Unix Unix is a multitasking, multi user operating system originally developed in AT T's Bell Labs in 1969. As Bell Labs gradually withdrew its support from the Multics ...
TSO Time Sharing Option (TSO) was a time sharing environment for IBM mainframe operating systems. TSO allowed multiple users to log into a mainframe operating system ...
OS/2 Beginning development in 1985, OS/2 was a personal computer operating system originally developed in a cooperative effort between IBM and Microsoft. Intended ...
MacOS Its initial version released in 1984 on the original Macintosh computer, the Mac OS (as it was known after 1997 with Mac OS 7.6) was an early windowed, graphical ...
MVS Released in 1974, Multiple Virtual Storage (MVS) was an IBM operating system used on the System/370 and System/390 mainframe computers, but was unrelated to the ...
MACH A Carnegie Mellon project from 1985 to 1994, Mach was a multiprocessor operating system kernel intended as a replacement for the traditional Unix kernel. Unix ...
IBM TSS Announced with the System/360, the IBM Time Sharing System (TSS/360) was a time sharing operating system intended for use on the Model 67 S/360 mainframe computer ...
IBM/360 Announced in 1964, and released in 1965, the System/360 (S/360) was a successful family of IBM mainframe computers that remained in production until 1977. ...
Site Security Testing As noted in the FAQ, this site has multiple levels of access. Some pages are viewable to the public, like the People pages containing completed ...
Security, Accuracy, and Privacy in Computer Systems (Martin) Martin, James. Security, Accuracy, and Privacy In Computer Systems . Englewood Cliffs, NJ: Prentice ...
Report on the IBM Joint Data Security Studies Data Security and Data Processing, Volumes 1 6 (seven pieces), Joint Study by IBM Corporation, Massachusetts Institute ...
NFPA 75 The NFPA 75 is a standard set by the National Fire Protection Association (NFPA) pertaining specifically to the protection of IT equipment, and IT equipment ...
IEEE Security Privacy IEEE Security Privacy is a peer reviewed magazine co published by the IEEE Computer Society and the IEEE Reliability Society. The magazine ...
Early/First Security Vulnerabilities Lists Main.lewi0740 03 Oct 2012
Denning Lattice Model First published in 1976, Dorothy Denning's "A Lattice Model of Secure Information Flow" was a mandatory access control model that established ...
Data Security Controls and Procedures Data Security Controls and Procedures A Philosophy for DP Installations , IBM, White Plains, NY: 1976. This book answers questions ...
Computers at Risk (Clark/NSF) National Research Council (U.S.). Computer Science and Telecommunications Board. System Security Study Committee. Computers at Risk ...
Computers Security Computers Security is the official journal of Technical Committee 11 (computer security) of the International Federation for Information Processing ...
Anderson Report Anderson, James P. Computer Security Technology Planning Study Volume II, ESD TR 73 51 . Bedford, MA: Electronic Systems Division, Air Force Systems ...
Army Regulation 380 380 (Campbell) AR 380 380 was the United States Army's implementation of the Department of Defense's Directive 5200.28 of 1972, which stipulated ...
AFIPS Resiliency of the U.S. Information Society Report This report was the culmination of a 1982 American Federation of Information Processing Societies (AFIPS) workshop ...
42 Suggestions for Improving Security in Data Processing Operations (Courtney/IBM) IBM. "42 Suggestions for Improving Security in Data Processing Operations," G520 ...
National Computer Security Center The National Computer Security Center (NCSC) was established in 1981 as the Department of Defense Computer Security Center. It changed ...
National Security Agency (NSA) Successor to the Armed Forces Security Agency (AFSA), the National Security Agency is a cryptological intelligence agency of the United ...
NIST Computer Security Division The Computer Security Division is a component of the National Institute of Standards and Technology's Information Technology Laboratory ...
InfraGard InfraGard is a Federal Bureau of Investigation program that facilitates the exchange of information between the FBI and the IT industry and academia in matters ...
IEEE Symposium on Security and Privacy Sponsored by the IEEE Computer Society Technical Committee on Security and Privacy, the IEEE Symposium on Security and Privacy ...
Brian Snow Brian Snow, who has a B.A. in mathematics from the University of Colorado, is the former Technical Director of three directorates in the NSA, the Research ...
Susan H. Nycum A graduate of Ohio Wesleyan University and the Stanford University of Law, Susan H. Nycum is a mediation and arbitration attorney who has focused on ...
Karl Levitt Graduating from New York University with a Ph.D. in 1966, Karl Levitt is a co director, with Matthew Bishop, Hao Chen, and Felix Wu of the Computer Security ...
Richard (Dickie) M. George Richard (Dickie) M. George, a graduate of Dartmouth College, was the Information Assurance Technical Director at National Security Agency ...
Security Kernel In computer operating systems, a security kernel is a self contained collection of security related statements that work to prevent unauthorized access ...
Timesheet Archive Week Starting Mon Tue Wed Thu Fri Sat Sun Total Summary 9/3/2012 6 4 ...
NicLewis 06 May 2013
NicLewis 19 Feb 2013
NicLewis 25 Jun 2013
NicLewis 24 Jun 2013
NicLewis 18 Jun 2013
NicLewis 06 Jun 2013
NicLewis 03 May 2013
NicLewis 02 May 2013
NicLewis 14 Mar 2013
NicLewis 08 Mar 2013
NicLewis 05 Mar 2013
Number of topics: 200

See also: rss-small RSS feed, recent changes with 50, 100, 200, 500, 1000 topics, all changes

Notes

1 : ande72a.pdf, p. ii: Computer Technology Security Planning Study by James ...

PEOPLE: "Wi" is link to Wikipedia entry (partial list) / "Li" is entry in LinkedIn / "CBI P" is a link to CBI archival papers collection / "OH" is link to existing ...
Secure Communications Processor (SCOMP) Secure Communications Processor (SCOMP) was a system, including hardware and a security kernel, developed by Honeywell Information ...
Ware Report (1970) Ware, Willis. Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security , Rand Report R609 1: Feb ...
MECHANISMS: Advanced Encryption Standard (AES) Asymmetric Key Cryptography Audit Authentication codes Avoidance and deterrence Awareness ...
High Assurance High Assurance in computer security indicates that a computer system adheres to a formal design specification based upon a mathematically proven security ...
Provably Secure Operating System (PSOS) The Provably Secure Operating System (PSOS) began in 1973 as an SRI International project to develop a secure general purpose ...
Computer Security in Popular, Scientific, and Managerial Literatures This page was constructed using the Web of Knowledge database search engine, searching for ...
PUBLICATIONS Featured Computer Security History Workshop (July 2014) ACSAC Classic Papers Computer Security Conference Timeline Matt Bishop Seminal ...
Willis Ware Willis Ware (August 31, 1920 November 22, 2013) was a leader in the field of computer security from the 1960s until his death in 2013. Ware received ...
Matt Bishop Collection of Seminal Papers (http://nob.cs.ucdavis.edu/history/seminal.html) Login Required to View Attachment James P. Anderson: Computer ...
Papers at Computer Security History Workshop (July 2014) CSHW 14 Session 1: Conceptual Foundations — Session Chair: Jeremy Epstein Michael Warner (U.S. Cyber ...
Computer Security History Workshop (July 2014) CSHW 14 On July 11 12, 2014, the Charles Babbage Institute held a workshop for historians and computer security professionals ...
Computer Security History Workshop (July 2014) CSHW 14 Jeffrey Yost, "Computer Security" (Guest editors' introduction) IEEE Annals of the History of Computing ...
EVENTS: 414s (hacker group of 1980s) @Large incidents formation of FBI computer crime squad Attempt to squelch Davida's paper on crypto Avondale ...
Covert Channels: References Butler Lampson, "Protection" paper given in 1970 ACM SIGOPS Operating Systems Review , Volume 8 Issue 1 (Jan 1974): 18 24 DOI ...
Morris Worm The Morris worm was released onto the Internet the evening of November 2, 1988, causing serious damage to the network. The worm was developed and released ...
Buffer Overflow "A buffer overflow is the computing equivalent of trying to pour two liters of water into a one liter pitcher: some water is going to spill out and ...
Carnegie Mellon CERT In 1988, the Morris worm, the first widespread incidence of malware on the Internet to capture the public's attention, pressed several United ...
Eugene Spafford Eugene "Spaf" Spafford is a computer scientist and computer security expert who is the founder and director of the Center for Education and Research ...
Worm A worm is a malicious program that spreads copies of itself through a network. The primary difference between a worm and a standard virus is that, whereas ...
The Cuckoo's Egg The Cuckoo's Egg, a 1989 book by computer scientist Clifford Stoll, details his investigation of a computer hacker who had gained unauthorized access ...
CONTENTS Data Encryption Standard (DES) The Data Encryption Standard (DES) is a 56 bit encryption system that was developed by IBM and adopted by the National Bureau ...
Encryption (New York Times series 1997 2001) Decoder Ring: How a Ragged Band Broke the Government's Hold on Cryptography attach a PDF of each article in separate ...
William Hugh Murray William Hugh Murray is a management consultant, information security professional and former chairperson of the International Information Systems ...
Triple DES (Data Encryption Standard) Triple DES is an encryption standard that describes the Triple Data Encryption Algorithm (TDEA, used interchangeably with TDES ...
Asymmetric Key Cryptography is an umbrella term for any algorithm that uses one secret key for encryption, and a different key for decryption.
To Do List see also To Do List Archive When editing all entries with automatic footnotes{{ like this

2 : Sources disagree whether it was 1 May or 3 May.


Topic revision: r1 - 16 Aug 2001 - 14:58:33 - PeterThoeny?
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback