Stalking the wily hacker
- 1 May 1988
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 31 (5) , 484-497
- https://doi.org/10.1145/42411.42412
Abstract
An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?Keywords
This publication has 8 references indexed in Scilit:
- ACM forumCommunications of the ACM, 1987
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- ViewpointCommunications of the ACM, 1987
- AdvertisementsIEEE Network, 1987
- [Front cover]Computer, 1986
- Reflections on trusting trustCommunications of the ACM, 1984
- Inference Controls for Statistical DatabasesComputer, 1983
- The Best Available Technologies for Computer SecurityComputer, 1983