|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T o
Length: 2663 (0xa67) Types: TextFile Names: »overview.tex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦36857feb3⟧ »./papers/Security_Primer/primer.tar.Z« └─⟦5c5f5f2d8⟧ └─⟦this⟧ »overview.tex«
\section{Overview} Since 1984, I have been periodically distracted from my education, my research and from my personal life to help {\it handle} computer emergencies. After presenting dozens of papers, tutorials talks on computer security, %Neil~Gorsuch and Karen~Armstrong Roger Anderson and George Michale arranged for me to lead a one day intensive seminar on the practical aspects of computer security in an unclassified networked environment for IEEE Compcon. This primer was written as a basic text for this type seminar and has been used for about 2 dozen of them in the past year , and is still in draft form. The text is divided into four main sections with a number of appendices. The first two major sections of this document contain the material for the morning lecture. The two following sections contain the afternoon lecture contain the afternoon's material. The remaining appendices include material that is of interest to those people who have to deal with other computer security issues. %Ken Willhouite, convince me to compress all of this material into a one %hour talk (without deleting any of the jokes). Since the simulation %exercise is normally four hours in itself, we will postpone the interactive %exercise for another day and I will talk {\em very fast\/} and skip over %all of the details. This primer is provided to cover these details. \comment{ Each section and major appendix begins with an overview which can be adapted to become an short overview talk and a concludes with a short checklist that can be used for review or as an outline for group discussion. } Since this primer is a direct and simple ``how to guide'' for cost-effective solutions to computer security problems, it does not contain as many stories and examples as my other tutorials. Those readers interested in these stories or who are having difficulty convincing people in their organization of the need for computer security are referred to {\it Attack of the Tiger Team}, when it becomes available. %(Microsoft Press 1989, ISBN 1556152248) and those readers interested in comprehensive list of computer security vulnerabilities should contact the author regarding the {\it Hackman\/} project. Suggestions, questions and other comments are always welcome. Please send comments to {\tt primer@cert.sei.cmu.edu}. I hope to publish a this set of notes in a more complete form in the future. When sending comments or questions, please mention that you were reading version CERT 0.6 of June 8, 1990. {\it \begin{center} Russell L. Brand \\ brand@lll-crg.llnl.gov \\ 1862 Euclid Ave, Suite 136 \\ Berkeley, CA \ 94709 \end{center} }