Computer Insecurity

10/21/98


Click here to start


Table of Contents

Computer Insecurity

The Internet Worm-- 10 Years After

How the Worm Spread

Back Doors

Passwords

Transitive Trust

Buffer Overflow

Why Does This Happen?

Time to Market Wins

Mobile Code

Why Use Mobile Code?

What Can we Do?

PPT Slide

Vulnerable Clients

Where’s the Firewall?

Cryptography

Why Isn’t Crypto Used?

Cryptography is Hard

Going Around Security

Bounding Insecurity

Moving Insecurity

The Systems Perspective

Building Secure Systems

Author: Steven M. Bellovin

Email: smb@research.att.com

Home Page: http://www.research.att.com/~smb

Download presentation source