Computer Insecurity
The Internet Worm--10 Years After
How the Worm Spread
Back Doors
Passwords
Transitive Trust
Buffer Overflow
Why Does This Happen?
Time to Market Wins
Mobile Code
Why Use Mobile Code?
What Can we Do?
PPT Slide
Vulnerable Clients
Where’s the Firewall?
Cryptography
Why Isn’t Crypto Used?
Cryptography is Hard
Going Around Security
Bounding Insecurity
Moving Insecurity
The Systems Perspective
Building Secure Systems
Email: smb@research.att.com
Home Page: http://www.research.att.com/~smb
Download presentation source