Leendert van Doorn,
Computer Break-ins: A Case Study
Abstract: This paper describes the modus operandi of
hackers based on multiple hacking attempts that occurred during
this year at some department computers. Special attention is paid
to the methods they use to break into computer systems and what
they do once they are in.
Gennady Medvinsky, B. Clifford Neuman,
NetCash:A Design for Practical Electronic Currency on the
Internet
Abstract: NetCash is a framework that supports realtime
electronic payments with provision of anonymity over an unsecure
network. It is designed to enable new types of services on the
Internet which have not been practical to date because of the
absence of a secure, scalable, potentially anonymous payment
method. NetCash strikes a balance between unconditionally
anonymous electronic currency, and signed instruments analogous
to checks that are more scalable but identify the principals in a
transaction. It does this by providing the framework within which
proposed electronic currency protocols can be integrated with the
scalable, but non-anonymous, electronic banking infrastructure
that has been proposed for routine transactions.
Christopher
William Klaus, Compromise:
What if your Machines are Compromised by an
Intruder.
Abstract: This FAQ deals with some suggestions for
securing your Unix machine after it has already been compromised.
Even if your machines have not been compromised, there are many
helpful tips on securing machine in this paper. I would
appreciate any suggestions. This FAQ will be posted
monthly.
Berny Goodheart,
How do you CRASH your UNIX System
Abstract: Summary of "How to Crash your UNIX system", also
includes several example programs that tends to crash the
machine.
Dennis M. Ritchie,
On the Security of UNIX
Abstract: This paper discusses the degrees of security
which can be provide under the UNIX system and offers a number of
hints on how to improve security.
Gennady Medivinsky, B. Clifford Neuman,
Electronic Currency for the Internet
Abstract: A framework for electronic currency for the
Internet that provides a real-time electronic payment
system.
Eugene
H. Spafford,
Unix and Security: The Influences of History
Abstract: \Unix\ has a reputation as an operating system
that is difficult to secure. This reputation is largely
unfounded. Instead, the blame lies partially with the traditional
use of \Unix\ and partially with the poor security consciousness
of its users. \Unix's reputation as a nonsecure operating system
comes not from design flaws but from practice. For its first 15
years, \Unix\ was used primarily in academic and computer
industrial environments --- two places where computer security
has not been a priority until recently. Users in these
environments often configured their systems with lax security,
and even developed philosophies that viewed security as something
to avoid. Because they cater to this community, (and hire from
it) many \Unix\ vendors have been slow to incorporate stringent
security mechanisms into their systems. This paper describes how
the history and development of \Unix\ can be viewed as the source
of many serious problems. Some suggestions are made of approaches
to help increase the security of your system, and of the \Unix\
community.
Built by Mark Crosbie and Ivan Krsul.