DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T o

⟦f0b05c5fd⟧ TextFile

    Length: 2663 (0xa67)
    Types: TextFile
    Names: »overview.tex«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦36857feb3⟧ »./papers/Security_Primer/primer.tar.Z« 
        └─⟦5c5f5f2d8⟧ 
            └─⟦this⟧ »overview.tex« 

TextFile

\section{Overview}

Since 1984, I have been periodically distracted from my education,
my research and from my personal life to help {\it handle} computer
emergencies.  After presenting  dozens of papers, tutorials talks on
computer security,  
%Neil~Gorsuch and Karen~Armstrong 
Roger Anderson and George Michale arranged for me
to lead a one day intensive seminar on the practical aspects of computer
security in an unclassified networked environment for IEEE Compcon.  This primer was
written as a basic text for this type seminar and has been used for
about 2 dozen of them in the past year , and is still in draft form.

The text is divided into four main sections with a number of
appendices.  The first two major sections of this document contain the
material for the morning lecture.  The two following sections contain
the afternoon lecture contain the afternoon's material.  The remaining
appendices include material that is of interest to those people who
have to deal with other computer security issues.

%Ken Willhouite, convince me to compress all of this material into a one
%hour talk (without deleting any of the jokes).  Since the simulation
%exercise is normally four hours in itself, we will postpone  the interactive
%exercise for another day and I will talk {\em very fast\/} and skip over
%all of the details.  This primer is provided to cover these details.


\comment{
 Each section and major appendix begins with an overview which can
 be adapted to become an short overview talk and a concludes with a
 short checklist that can be used for review or as an outline for group
 discussion. }

Since this primer is a direct and simple ``how to guide'' for
cost-effective solutions to computer security problems, it does not
contain as many stories and examples as my other tutorials.  Those
readers interested in these stories or who are having difficulty
convincing people in their organization of the need for computer
security are referred to {\it Attack of the Tiger Team}, when it
becomes available.
%(Microsoft Press 1989, ISBN 1556152248) 
and those
readers interested in comprehensive list of computer security
vulnerabilities should contact the author regarding the {\it
Hackman\/} project.

Suggestions, questions and other comments are always welcome.  Please
send comments to {\tt primer@cert.sei.cmu.edu}.  I hope
to publish a this set of notes in a more  complete form in the future.
When sending comments or questions, please mention that you were
reading version CERT 0.6 of June 8, 1990.

{\it
\begin{center}
Russell L. Brand \\
brand@lll-crg.llnl.gov \\
1862 Euclid Ave, Suite 136 \\
Berkeley, CA \ 94709

\end{center}
}