The Community for Technology Leaders
Green Image
Issue No. 03 - July-Sept. (2012 vol. 34)
ISSN: 1058-6180
pp: 4-21
Edward Hunt , College of William & Mary
The US Department of Defense was the driving force behind the development of sophisticated computer penetration methodologies. By analyzing the security of the nation's time-sharing computer systems, security analysts developed an expert understanding of computer penetration. Eventually, the US and its intelligence agencies utilized computer penetration techniques to wage offensive cyberattacks.
US Department of Defense, Military communication, Cyberspace, Security, Computer security, Information protection, cyberwar, information assurance, history of computing, computer security, computer penetration
Edward Hunt, "US Government Computer Penetration Programs and the Implications for Cyberwar", IEEE Annals of the History of Computing, vol. 34, no. , pp. 4-21, July-Sept. 2012, doi:10.1109/MAHC.2011.82
101 ms
(Ver 3.1 (10032016))