The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - Feb. (2012 vol.45)
pp: 59-65
Gary C. Kessler , Norwich University
ABSTRACT
Although attack vectors on data and telecommunications infrastructures have changed in the past 40 years, attack types remain eerily similar. Perhaps the focus should be less on computers and networks and more on the threat itself.
INDEX TERMS
information security, attack scenarios, computing history
CITATION
Gary C. Kessler, "Information Security: New Threats or Familiar Problems?", Computer, vol.45, no. 2, pp. 59-65, Feb. 2012, doi:10.1109/MC.2011.262
REFERENCES
1. B. Sterling, The Hacker Crackdown: Law and Disorder on the Electronic Frontier, Bantam Books, 1992.
2. C. Stoll, The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, Pocket Books, 1989.
3. N. Randall, The Soul of the Internet: Net Gods, Netizens, and the Wiring of the World, Int'l Thompson Computer Press, 1997.
4. K. Hafner and M. Lyon, Where Wizards Stay Up Late: The Origins of the Internet, Simon and Schuster, 1996.
5. P.H. Salus, Casting the Net: From Arpanet to Internet and Beyond, Addison-Wesley, 1995.
6. P. Sprenger, "Sun on Privacy: 'Get over It,'" Wired,26 Jan. 1999; www.wired.com/politics/law/news/1999/0117538.
7. M. Zuckerberg, "An Open Letter from Facebook Founder Mark Zuckerberg," The Facebook Blog,1 Dec. 2009; http://blog.facebook.comblog.php?post=190423927130.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool