8.2 ╩ε∞∩ⁿ■≥σ≡φα  ßστε∩α±φε±≥ⁿ

[CAELLI]
Caelli, W., Editor, "Computer Security in the Age of Information", Proceedings of the Fifth IFIP International Conference on Computer Security, IFIP/Sec '88.

[CARROLL]
Carroll, J., "Computer Security", 2nd Edition, Butterworth Publishers, Stoneham, MA, 1987.

[COOPER]
Cooper, J., "Computer and Communications Security: Strategies for the 1990s", McGraw-Hill, 1989.

[BRAND]
Brand, R., "Coping with the Threat of Computer Security Incidents: A Primer from Prevention through Recovery", R. Brand, 8 June 1990.

╧ε ∞σpσ ≥επε, ΩαΩ ßστε∩α±φε±≥ⁿ ±≥αφεΓΦ≥±  Γ±σ ßεδσσ Γαµφ√∞ Γε∩pε±ε∞ Γ ±εΓpσ∞σφφε∞ εß∙σ±≥Γσ, εφα φα≈Φφασ≥ ≥pσßεΓα≥ⁿ ±Φ±≥σ∞α≥Φ≈σ±Ωεπε ∩εΣ⌡εΣα. ╬≥ ßεδⁿ°Φφ±≥Γα ∩pεßδσ∞, ±Γ ταφφ√⌡ ± Ωε∞∩ⁿ■≥σpφεΘ ßστε∩α±φε±≥ⁿ■ ∞εµφε τα∙Φ≥Φ≥ⁿ±  ∩pε±≥√∞Φ Σσ°σΓ√∞Φ ∞σpα∞Φ. ╤α∞√σ Γαµφ√σ Φ φσΣεpεπΦσ ∞σp√ Σεδµφ√ ∩pΦ∞σφ ≥ⁿ±  φα ⌠ατα⌡ ∩δαφΦpεΓαφΦ  Φ Γε±±≥αφεΓδσφΦ . ▌≥Φ ∞σ≥εΣ√ ∩pσΣ±≥αΓδσφ√ Γ ²≥εΘ ±≥α≥ⁿσ, Ωε≥εpα  εΩαφ≈ΦΓασ≥±  p≤ΩεΓεΣ±≥Γε∞ ∩ε ≤δαµΦΓαφΦ■ Φφ÷ΦΣσφ≥α Φ Γε±±≥αφεΓδσφΦ■ ∩ε±δσ φσπε. ─ε±≥≤∩φα ΩαΩ cert.sei.cmu.edu:/pub/info/primer.

[CHESWICK]
Cheswick, B., "The Design of a Secure Internet Gateway", Proceedings of the Summer Usenix Conference, Anaheim, CA, June 1990.

╩pα≥Ωεσ ±εΣσpµαφΦσ: Γ AT&T ⌠≤φΩ÷ΦεφΦp≤σ≥ ßεδⁿ°εΘ Γφ≤≥pσφφΦΘ ╚φ≥σpφσ≥, Ωε≥εp√Θ φ≤µφε τα∙Φ∙α≥ⁿ ε≥ Γφσ°φΦ⌡ α≥αΩ, Γ ≥ε µσ Γpσ∞  εßσ±∩σ≈ΦΓα  Σε±≥≤∩ Ω ∩εδστφ√∞ ±σpΓΦ±α∞. ▌≥α ±≥α≥ⁿ  ε∩Φ±√Γασ≥ ╚φ≥σpφσ≥εΓ±ΩΦΘ °δ■τ AT&T. ▌≥ε≥ °δ■τ ∩ετΓεδ σ≥ εpπαφΦτεΓα≥ⁿ ΓταΦ∞φ√Θ Σε±≥≤∩ Ω ∩ε≈≥σ Φ ∞φεπΦ∞ Σp≤πΦ∞ ╚φ≥σpφσ≥εΓ±ΩΦ∞ ±δ≤µßα∞ ∞σµΣ≤ Γφ≤≥pσφφΦ∞ Φ Γφσ°φΦ∞ ╚φ≥σpφσ≥ε∞. ▌≥ε pσαδΦτ≤σ≥±  ßστ ∩p ∞εΘ IP-±Γ τφε±≥Φ ± ∩ε∞ε∙ⁿ■ ΣΓ≤⌡ ▌┬╠: ΣεΓσpσφφεΘ Γφ≤≥pσφφσΘ ▌┬╠ Φ φσΣεΓσpσφφεπε Γφσ°φσπε °δ■τα. ╬φΦ ±εσΣΦφσφ√ Γ√ΣσδσφφεΘ δΦφΦσΘ. ┬φ≤≥pσφφ   ∞α°Φφα εßσ±∩σ≈ΦΓασ≥ φσ±ΩεδⁿΩε ≥∙α≥σδⁿφε τα∙Φ∙ασ∞√⌡ ±δ≤µß Σδ  Γφσ°φσπε °δ■τα. ▌≥α Ωεφ⌠Φπ≤pα÷Φ  ∩ε∞επασ≥ τα∙Φ≥Φ≥ⁿ Γφ≤≥pσφφΦΘ ╚φ≥σpφσ≥, σ±δΦ Γφσ°φ   ∞α°Φφα ±Ωε∞∩pε∞σ≥ΦpεΓαφα.

▌≥ε ε≈σφⁿ ∩εδστφα  Φ Φφ≥σpσ±φα  pατpαßε≥Ωα. ┴εδⁿ°Φφ±≥Γε ßpαφΣ∞α≤²pεΓ ∩εδαπασ≥±  φα ▌┬╠, Ωε≥εpα  ∩pΦ Ωε∞∩pε∞σ≥α÷ΦΦ ∩ετΓεδ σ≥ ∩εδφ√Θ Σε±≥≤∩ Ω ∞α°Φφα∞ τα φσΘ. ╥αΩµσ, ßεδⁿ°Φφ±≥Γε ßpαφΣ∞α≤²pεΓ ≥pσß≤■≥, ≈≥εß√ ∩εδⁿτεΓα≥σδΦ, Ωε≥εp√∞ ≥pσß≤σ≥±  Σε±≥≤∩ Ω ╚φ≥σpφσ≥εΓ±ΩΦ∞ ±δ≤µßα∞, ß√δΦ ταpσπΦ±≥pΦpεΓαφ√ φα ßpαφΣ∞α≤²pσ. ╨ατpαßε≥Ωα AT&T ∩ετΓεδ σ≥ Γφ≤≥pσφφΦ∞ ∩εδⁿτεΓα≥σδ ∞ AT&T Φ∞σ≥ⁿ Σε±≥≤∩ Ω ±δ≤µßα∞ TELNET Φ FTP ± Φ⌡ pαßε≈Φ⌡ ±≥αφ÷ΦΘ, φσ pσπΦ±≥pΦp≤ ±ⁿ φα ßpαφΣ∞α≤²pσ. ╬≈σφⁿ ∩εδστφα  ±≥α≥ⁿ , Ωε≥εpα  ∩εΩατ√Γασ≥, ΩαΩ ±ε⌡pαφΦ≥ⁿ ∩pσΦ∞≤∙σ±≥Γα ∩εΣΩδ■≈σφΦ  Ω ╚φ≥σpφσ≥≤, φσ ≥σp   ∩pΦ ²≥ε∞ ßστε∩α±φε±≥Φ.

[CURRY]
Curry, D., "Improving the Security of Your UNIX System", SRI International Report ITSTD-721-FR-90-21, April 1990.

▌≥α ±≥α≥ⁿ  ε∩Φ±√Γασ≥ ∞σp√, Ωε≥εp√σ Γ√, ΩαΩ ±Φ±≥σ∞φ√Θ αΣ∞ΦφΦ±≥pα≥εpα, ∞εµσ≥σ ∩pσΣ∩pΦφ ≥ⁿ, ≈≥εß√ ±Σσδα≥ⁿ Γα° Unix ßεδσσ τα∙Φ∙σφφ√∞. ╬pΦσφ≥ΦpεΓαφφα  Γ-ε±φεΓφε∞ φα SunOS 4.X, ²≥α ±≥α≥ⁿ  ∩pΦ∞σφΦ∞α Ω δ■ßεΘ ±Φ±≥σ∞σ Unix φα ε±φεΓσ ┴σpΩδΦ ± ΦδΦ ßστ NFS Φ ± ΦδΦ ßστ Yellow Pages(NIS). ╫α±≥ⁿ ²≥εΘ Φφ⌠εp∞α÷ΦΦ ≥αΩµσ ∞εµσ≥ ß√≥ⁿ ∩pΦ∞σφΦ∞α Σδ  System V, ⌡ε≥  ²≥ε Φ φσ  Γδ σ≥±  ÷σδⁿ■ ±≥α≥ⁿΦ. ╬≈σφⁿ ∩εδστφ√Θ ±∩pαΓε≈φΦΩ, ≥αΩµσ Σε±≥≤∩σφ Γ ╚φ≥σpφσ≥σ, ∩ε αΣpσ±≤ cert.sei.cmu.edu:/pub/info.

[FITES]
Fites, M., Kratz, P. and A. Brebner, "Control and Security of Computer Information Systems", Computer Science Press, 1989.

▌≥α ΩφΦπα  Γδ σ≥±  ⌡εpε°Φ∞ p≤ΩεΓεΣ±≥Γε∞ ∩ε Γε∩pε±α∞, ΓετφΦΩα- ■∙Φ∞ ∩pΦ pατpαßε≥Ωσ ╧╨─ Φ ╤╨─. ▌≥α ΩφΦπα  Γδ σ≥±  ≤≈σßφΦΩε∞ Σδ  ΓΓεΣφεπε Ω≤p±α ∩ε ßστε∩α±φε±≥Φ ╚╤.

▌≥α ΩφΦπα pατΣσδσφα φα 5 ≈α±≥σΘ: ╙∩pαΓδσφΦσ ╨Φ±Ωε∞(1), ╟α∙Φ≥φ√σ ∞σp√: εpπαφΦτα÷εφφ√σ(2), ╟α∙Φ≥φ√σ ∞σp√: ∩pεπpα∞∞φε- α∩∩αpα≥φ√σ(3), ▐pΦΣΦ≈σ±ΩΦσ ∩pεßδσ∞√ Φ ∩pε⌠σ±±ΦεφαδΦτ∞(4), ╨σΩε∞σφΣα÷ΦΦ ∩ε Ωεφ≥pεδ■ τα Ωε∞∩ⁿ■≥σpε∞ CICA(5).

▌≥α ΩφΦπα ε±εßσφφε ∩εδστφα ∩ε ∩pΦ≈Φφσ ±Γεσπε ∩≡ε±≥επε ∩εΣ⌡εΣα Ω ßστε∩α±φε±≥Φ, ∩pΦ Ωε≥εpε∞ τΣpαΓ√Θ ±∞√±δ  Γδ σ≥±  πδαΓφ√∞ ∩pΦ pατpαßε≥Ωσ ╧╨─. └Γ≥εp√ ε≥∞σ≈α■≥, ≈≥ε ±≤∙σ±≥Γ≤σ≥ ≥σφΣσφ÷Φ  Φ±Ωα≥ⁿ ßεδσσ ≥σ⌡φΦ≈σ±ΩΦσ pσ°σφΦ  ∩pεßδσ∞ ßστε∩α±φε±≥Φ, ταß√Γα  ∩pΦ ²≥ε∞ εpπαφΦτα÷Φεφφ√σ ∞σp√, Ωε≥εp√σ ≈α±≥ε Σσ°σΓδσ Φ ²⌠⌠σΩ≥ΦΓφσσ. 298 ±≥pαφΦ÷, ΓΩδ■≈α  ±±√δΩΦ Φ ΦφΣσΩ±.

[GARFINKEL]
Garfinkel, S, and E. Spafford, "Practical Unix Security", O'Reilly & Associates, ISBN 0-937175-72-2, May 1991.

Approx 450 pages, $29.95. Orders: 1-800-338-6887 (US & Canada), 1-707-829-0515 (Europe), email: nuts@ora.com

╬Σφα Φτ ±α∞√⌡ ∩εδστφ√⌡ ΩφΦπ, Φ∞σ■∙Φ⌡±  ∩ε ßστε∩α±φε±≥Φ Unix. ╧σpΓα  ≈α±≥ⁿ ΩφΦπΦ ε∩Φ±√Γασ≥ ε±φεΓ√ Unix Φ ßστε∩α±φε±≥Φ Γ φσΘ, Σσδα  ε±εß√Θ ≤∩εp φα ∩αpεδΦ. ┬≥εpα  ≈α±≥ⁿ ε∩Φ±√Γασ≥, ΩαΩ ±Σσδα≥ⁿ ±Φ±≥σ∞≤ ßστε∩α±φεΘ. ╬±εßσφφε Φφ≥σpσ±φεΘ Σδ  ╚φ≥σpφσ≥εΓ±Ωεπε ∩εδⁿτεΓα≥σδ  ∞επ≤≥ ß√≥ⁿ πδαΓ√ ∩ε ±σ≥σΓεΘ ßστε∩α±φε±≥Φ, Ωε≥εp√σ ε∩Φ±√Γα■≥ ∞φεπΦσ Φτ ∩pεßδσ∞ ßστε∩α±φε±≥Φ, ± Ωε≥εp√∞Φ ±≥αδΩΦΓα■≥±  ╚φ≥σpφσ≥εΓ±ΩΦσ ∩εδⁿτεΓα≥σδΦ. ╫σ≥√pσ πδαΓ√ pα±±∞α≥pΦΓα■≥ ≤δαµΦΓαφΦσ Φφ÷ΦΣσφ≥εΓ ± ßστε∩α±φε±≥ⁿ■, Φ ταΓσp°ασ≥±  ΩφΦπα εßτεpε∞ °Φ⌠pεΓαφΦ , ⌠ΦτΦ≈σ±ΩεΘ ßστε∩α±φε±≥Φ Φ ±∩Φ±Ωε∞ ∩εδστφ√⌡ Ωεφ≥pεδⁿφ√⌡ Γε∩pε±εΓ Φ Φ±≥ε≈φΦΩεΓ Φφ⌠εp∞α÷ΦΦ. ▌≥α ΩφΦπα ε∩pαΓΣ√Γασ≥ ±Γεσ φατΓαφΦσ: εφα Σασ≥ Φφ⌠εp∞α÷Φ■ ε Γετ∞εµφ√⌡ ßpσ°α⌡ Γ ßστε∩α±φε±≥Φ, ⌠αΘδα⌡, Ωε≥εp√σ φαΣε ∩pεΓσp ≥ⁿ Φ Γσ∙α⌡, Ωε≥εp√σ ≤δ≤≈°α■≥ ßστε∩α±φε±≥ⁿ. ▌≥α ΩφΦπα  Γδ σ≥±  ΓσδΦΩεδσ∩φ√∞ Σε∩εδφσφΦσ∞ Ω ∩≡σΣ√Σ≤∙σΘ ΩφΦπσ.

[GREENIA90]
Greenia, M., "Computer Security Information Sourcebook", Lexikon Services, Sacramento, CA, 1989.

╨≤ΩεΓεΣ±≥Γε αΣ∞ΦφΦ±≥≡α≥ε≡α ∩ε Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ. ╤εΣσ≡µΦ≥ ≤Ωατα≥σδⁿ φα πδαΓφ√σ ±∩≡αΓε≈φ√σ ∞α≥σ≡Φαδ√, ΓΩδ■≈α  ßΦßδΦεπ≡α⌠Φ■ ∩ε ≤∩≡αΓδσφΦ■ Σε±≥≤∩ε∞ Φ Ωε∞∩ⁿ■≥σ≡φ√∞ ∩≡σ±≥≤∩δσφΦ ∞.

[HOFFMAN]
Hoffman, L., "Rogue Programs: Viruses, Worms, and Trojan Horses", Van Nostrand Reinhold, NY, 1990. (384 ±≥≡αφΦ÷√, ΓΩδ■≈ασ≥ ßΦßδΦεπ≡α⌠Φ≈σ±ΩΦσ ±±√δΩΦ Φ ΦφΣσΩ±.)

[JOHNSON]
Johnson, D., and J. Podesta, "Formulating A Company Policy on Access to and Use and Disclosure of Electronic Mail on Company Computer Systems".

▌≥α ΩφΦπα ∩εΣπε≥εΓδσφα Σδ  EMA ΣΓ≤∞  ²Ω±∩σ≡≥α∞Φ ∩ε ταΩεφα∞ ε Ωεφ⌠ΦΣσφ÷Φαδⁿφε±≥Φ δΦ≈φεΘ Φφ⌠ε≡∞α÷ΦΦ. ▀Γδ σ≥±  ΓΓσΣσφΦσ∞ Γ ²≥Φ Γε∩≡ε±√ Φ ±εΣσ≡µΦ≥ φσΩε≥ε≡√σ Γα≡Φαφ≥√ ╧╨─ ─ε±≥≤∩φα ≈σ≡στ The Electronic Mail Association (EMA) 1555 Wilson Blvd, Suite 555, Arlington, VA, 22209. (703) 522-7111.

[KENT]
Kent, Stephen, "E-Mail Privacy for the Internet: New Software and Strict Registration Procedures will be Implemented this Year", Business Communications Review, Vol. 20, No. 1, Pg. 55, 1 January 1990.

[LU]
Lu, W., and M. Sundareshan, "Secure Communication in Internet Environments: A Hierachical Key Management Scheme for End-to-End Encryption", IEEE Transactions on Communications, Vol. 37, No. 10, Pg. 1014, 1 October 1989.

[LU1]
Lu, W., and M. Sundareshan, "A Model for Multilevel Security in Computer Networks", IEEE Transactions on Software Engineering, Vol. 16, No. 6, Page 647, 1 June 1990.

[NSA]
National Security Agency, "Information Systems Security Products and Services Catalog", NSA, Quarterly Publication.

╩α≥αδεπ └═┴ ±εΣσ≡µΦ≥ ±δσΣ≤■∙Φσ πδαΓ√: ╤∩Φ±εΩ εΣεß≡σφφ√⌡ Ω≡Φ∩≥επ≡α⌠Φ≈σ±ΩΦ⌡ ∩≡εΣ≤Ω≥εΓ; ╤∩Φ±εΩ εΣεß≡σφφ√⌡ └═┴ ∩≡εΣ≤Ω≥εΓ, ≡σαδΦτ≤■∙Φ⌡ DES; ╤∩Φ±εΩ τα∙Φ∙σφφ√⌡ ±σ≡ΓΦ±εΓ; ╤∩Φ±εΩ ±σ≡≥Φ⌠Φ- ÷Φ≡εΓαφφ√⌡ ∩≡εΣ≤Ω≥εΓ; ╤∩Φ±εΩ ≡σΩε∞σφΣ≤σ∞√⌡ ∩≡εΣ≤Ω≥εΓ; ╤∩Φ±εΩ εΣεß≡σφφ√⌡ ∩≡επ≡α∞∞φ√⌡ ±≡σΣ±≥Γ.

▌≥ε≥ Ωα≥αδεπ Σε±≥≤∩σφ ≈σ≡στ Superintendent of Documents, U.S. Government Printing Office, Washington, D.C. ╠εµφε τΓεφΦ≥ⁿ ∩ε ≥σδσ⌠εφ≤: (202) 783-3238.

[OTA]
United States Congress, Office of Technology Assessment, "Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information", OTA-CIT-310, October 1987.

▌≥ε≥ ε≥≈σ≥, ∩εΣπε≥εΓδσφφ√Θ Σδ  Ωε∞Φ≥σ≥α Ωεφπ≡σ±±α, ≡α±±∞α≥≡ΦΓασ≥ ╘σΣσ≡αδⁿφ≤■ ∩εδΦ≥ΦΩ≤ ∩ε τα∙Φ≥σ ²δσΩ≥≡εφφεΘ Φφ⌠ε≡∞α÷ΦΦ Φ  Γδ σ≥±  Φφ≥σ≡σ±φ√∞ Φτ-τα Γε∩≡ε±εΓ, ΓετφΦΩα■∙Φ⌡ Γ ±Γ τΦ ± ΓδΦ φΦσ∞ ≥σ⌡φεδεπΦΦ, Φ±∩εδⁿτ≤σ∞εΘ Σδ  τα∙Φ≥√ Φφ⌠ε≡∞α÷ΦΦ. ╬φ ≥αΩµσ ±δ≤µΦ≥ ⌡ε≡ε°Φ∞ ΓΓσΣσφΦσ∞ Γ ≡ατδΦ≈φ√σ ∞σ⌡αφΦτ∞√ °Φ⌠≡εΓαφΦ  Φ τα∙Φ≥√ Φφ⌠ε≡∞α÷ΦΦ. 185 ±≥≡αφΦ÷. ─ε±≥≤∩σφ ≈σ≡στ U.S. Government Printing Office.

[PALMER]
Palmer, I., and G. Potter, "Computer Security Risk Management", Van Nostrand Reinhold, NY, 1989.

[PFLEEGER]
Pfleeger, C., "Security in Computing", Prentice-Hall, Englewood Cliffs, NJ, 1989.

▀Γδ  ±ⁿ ΓΓεΣφ√∞ ≤≈σßφΦΩε∞ ∩ε Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ, ²≥α ΩφΦπα ±εΣσ≡µΦ≥ ΓσδΦΩεδσ∩φεσ Φ ε≈σφⁿ Σε±≥≤∩φεσ ΓΓσΣσφΦσ Γ Ωδα±±Φ≈σ±ΩΦσ ∩≡εßδσ∞√ Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ Φ Φ⌡ ≡σ°σφΦ , ± ε±εß√∞ ≤∩ε≡ε∞ φα °Φ⌠≡εΓαφΦσ. ╫α±≥ⁿ, ε∩Φ±√Γα■∙α  °Φ⌠≡εΓαφΦσ,  Γδ σ≥±  ⌡ε≡ε°Φ∞ ΓΓσΣσφΦσ Γ ²≥ε ∩≡σΣ∞σ≥. ─≡≤πΦσ ≡ατΣσδ√ ε∩Φ±√Γα■≥ ≡ατ≡αßε≥Ω≤ ßστε∩α±φ√⌡ ∩≡επ≡α∞∞ Φ └╤, ßστε∩α±φε±≥ⁿ ßατ Σαφφ√⌡, ßστε∩α±φε±≥ⁿ ∩σ≡±εφαδⁿφ√⌡ Ωε∞∩ⁿ■≥σ≡εΓ, ±σ≥σΓ≤■ Φ Ωε∞∞≤φΦΩα÷Φεφφ≤■ ßστε∩α±φε±≥ⁿ, ⌠ΦτΦ≈σ±Ω≤■ ßστε∩α±φε±≥ⁿ, αφαδΦτ ≡Φ±Ωα Φ ∩δαφΦ≡εΓαφΦσ ßστε∩α±φε±≥Φ, ■≡ΦΣΦ≈σ±ΩΦσ Φ ²≥Φ≈σ±ΩΦσ ∩≡εßδσ∞√. 583 ±≥≡αφΦ÷√, ΓΩδ■≈α  ΦφΣσΩ± Φ ßΦßδΦεπ≡α⌠Φ■.

[SHIREY]
Shirey, R., "Defense Data Network Security Architecture", Computer Communication Review, Vol. 20, No. 2, Page 66, 1 April 1990.

[SPAFFORD]
Spafford, E., Heaphy, K., and D. Ferbrache, "Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats", ADAPSO, 1989. (109 pages.)

▌≥ε ⌡ε≡ε°ΦΘ εß∙ΦΘ ±∩≡αΓε≈φΦΩ ∩ε Ωε∞∩ⁿ■≥σ≡φ√∞ ΓΦ≡≤±α∞ Φ ±Γ ταφφ√∞ ± φΦ∞Φ Γε∩≡ε±α∞. ╧ε∞Φ∞ε Σσ≥αδⁿφεπε ε∩Φ±αφΦ  ΓΦ≡≤±εΓ, ΩφΦπα ≥αΩµσ ε⌡Γα≥√Γασ≥ ∞φεπε εß∙Φ⌡ Γε∩≡ε±εΓ ßστε∩α±φε±≥Φ, ■≡ΦΣΦ≈σ±ΩΦσ ∩≡εßδσ∞√, ±Γ ταφφ√σ ± ßστε∩α±φε±≥ⁿ■, Φ ΓΩδ■≈ασ≥ ±∩Φ±εΩ ταΩεφεΓ, µ≤≡φαδ√, ∩ε±Γ ∙σφφ√σ Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ, Φ Σ≡≤πΦσ Φ±≥ε≈φΦΩΦ Φφ⌠ε≡∞α÷ΦΦ ε ßστε∩α±φε±≥Φ.

─ε±≥≤∩φα ≈σ≡στ: ADAPSO, 1300 N. 17th St, Suite 300, Arlington VA 22209. (703) 522-5055.

[STOLL88]
Stoll, C., "Stalking the Wily Hacker", Communications of the ACM, Vol. 31, No. 5, Pgs. 484-497, ACM, New York, NY, May 1988.

▌≥α ±≥α≥ⁿ  ε∩Φ±√Γασ≥ φσΩε≥ε≡√σ ≥σ⌡φΦ≈σ±ΩΦσ ∩≡Φσ∞√, Φ±∩εδⁿτ≤■∙Φσ±  Σδ  Γ√±δσµΦΓαφΦ  τδε≤∞√°δσφφΦΩα, Ωε≥ε≡√σ ∩ετΣφσσ ß√δΦ ε∩Φ±αφ√ Γ "▀Θ÷σ Ω≤Ω≤°ΩΦ"(±∞ε≥≡Φ φΦµσ)

[STOLL89]
Stoll, C., "The Cuckoo's Egg", ISBN 00385-24946-2, Doubleday, 1989.

╩δΦ⌠⌠ε≡Σ ╤≥εδδ, α±≥≡εφε∞, εΩαταΓ°ΦΘ±  ±Φ±≥σ∞φ√∞ αΣ∞ΦφΦ±≥≡α≥ε≡ε∞ Unix, ε∩Φ±√Γασ≥ ≤ΣΦΓΦ≥σδⁿφ≤■, φε ∩≡αΓΣΦΓ≤■ Φ±≥ε≡Φ■ ε ≥ε∞, ΩαΩ εφ Γ√±δσΣΦδ Ωε∞∩ⁿ■≥σ≡φεπε τδε≤∞√°δσφφΦΩα, ∩≡εφΦΩ°σπε Γ α∞σ≡ΦΩαφ±ΩΦσ Γεσφφ√σ Φ Φ±±δσΣεΓα≥σδⁿ±ΩΦσ ±σ≥Φ. ▌≥α ΩφΦπα δσπΩα Σδ  ∩εφΦ∞αφΦ  Φ ∞εµσ≥ ±δ≤µΦ≥ⁿ Φφ≥σ≡σ±φ√∞ ΓΓσΣσφΦσ∞ Γ ∞Φ≡ ±σ≥σΘ. ─µεφ ╧ε±≥σδ φα∩Φ±αδ Γ ≡σ÷σφτΦΦ φα ΩφΦπ≤:" [²≥α ΩφΦπα]

...  Γδ σ≥±  αß±εδ■≥φε φσεß⌡εΣΦ∞Φ√∞ ≈≥σφΦσ∞ Σδ  ≥σ⌡, Ω≥ε Φ±∩εδⁿτ≤σ≥ δ■ßεΘ Ωε∞∩ⁿ■≥σ≡, ∩εΣΩδ■≈σφφ√Θ Ω ╚φ≥σ≡φσ≥≤ ΦδΦ Σ≡≤πεΘ Ωε∞∩ⁿ■≥σ≡φεΘ ±σ≥Φ "

[VALLA]
Vallabhaneni, S., "Auditing Computer Security: A Manual with Case Studies", Wiley, New York, NY, 1989.

═αταΣ | ╤εΣσ≡µαφΦσ | ┬∩σ≡σΣ