This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Information Security: New Threats or Familiar Problems?
Feb. 2012 (vol. 45 no. 2)
pp. 59-65
Gary C. Kessler, Norwich University
Although attack vectors on data and telecommunications infrastructures have changed in the past 40 years, attack types remain eerily similar. Perhaps the focus should be less on computers and networks and more on the threat itself.

1. B. Sterling, The Hacker Crackdown: Law and Disorder on the Electronic Frontier, Bantam Books, 1992.
2. C. Stoll, The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, Pocket Books, 1989.
3. N. Randall, The Soul of the Internet: Net Gods, Netizens, and the Wiring of the World, Int'l Thompson Computer Press, 1997.
4. K. Hafner and M. Lyon, Where Wizards Stay Up Late: The Origins of the Internet, Simon and Schuster, 1996.
5. P.H. Salus, Casting the Net: From Arpanet to Internet and Beyond, Addison-Wesley, 1995.
6. P. Sprenger, "Sun on Privacy: 'Get over It,'" Wired,26 Jan. 1999; www.wired.com/politics/law/news/1999/0117538.
7. M. Zuckerberg, "An Open Letter from Facebook Founder Mark Zuckerberg," The Facebook Blog,1 Dec. 2009; http://blog.facebook.comblog.php?post=190423927130.

Index Terms:
information security, attack scenarios, computing history
Citation:
Gary C. Kessler, "Information Security: New Threats or Familiar Problems?," Computer, vol. 45, no. 2, pp. 59-65, Feb. 2012, doi:10.1109/MC.2011.262
Usage of this product signifies your acceptance of the Terms of Use.