News from Nowhere: Reality Hackers

Total Page:16

File Type:pdf, Size:1020Kb

News from Nowhere: Reality Hackers 46 COLUMNS global detective story - which, in fact, at the Smithsonian Institute for it is. Astrophysics, Cambridge, Mas­ Tuesday, June 23,1988: West Ger­ sachusetts. His computer was under man police seize computer equip­ attack too! ment, discs and printouts from an Stoll represents another version of apartment and a company office in the hacker figure. The hacker as a Hanover. Shortly afterwards, legitimate user and manager of com­ Markus Hess is picked up by police puter systems who solves problems, for breaking into American military who keeps the system not only run­ computer networks to collect ning but innovating. Stoll had a passwords and other information, reputation for coming up with ways kaos was allegedly selling the infor­ to foil the other kinds of hacker, the mation to KGB agents in exchange Landreth and Hess-style crackers. So for large amounts of cash and he was a logical person for Gene cocaine. Hess was using an elaborate Miya to call. Stoll made some calls series of computer networks, exploit­ and discovered other networked NEWS ing a few simple bugs in system computers were being attacked by a programs. He was even able to con­ virus. He tried to log onto a computer FROM sume a large amount of free com­ at the Lawrence Berkeley puter and network time using the Laboratory, California, where he accounts of a large American defence used to work as a system manager contractor. Ironically, Hess was and where his anti-hacker hacking NOWHERE detected when Stoll found a 75c error career began. Stoll typed in a com­ in a billing system for computer time. mand he picked up from watching his Kaos hacker foes at Berkeley, and Reality Hackers Bill Landreth is also a hacker, but found that the Berkeley computer of a slightly different kind. In his was infected. This gave him his first book Tne Cracker he presents an clue to the nature of the virus: the Last month a West German by the image of the cracker-style hacker as computer was interfacing wildly in name of Markus Hess was given the loner, the outsider, prowling the all directions, trying to talk to every an 18-month suspended sentence frontiers of the computer networks. other computer it could reach. With Like a figure from a Hollywood after being found guilty of a the computer trying to connect to western, the hacker knows a tech­ bizarre series of international every other computer, the flow of nologically dynamic landscape with computer hacking offences. Ironi­ information was becoming a cally, he and his associates in the few laws or customs. A new world cacophony of noise, making the flow without a history, where everything Kaos Komputer Klub had been of information impossible, slowing has to be invented on the moment, if selling information on American the computer's processing down to a not exactly on the spot. (There is no crawl. military-base computers to mem­ spot exactly. The hacker moves in a bers of Eastern European security logical space which is only inciden­ Every time Stoll tried to shut down organisations who have, by now, tally a movement in geographical the connections, new ones would radically altered their strategic space. They move in an information spring up. Like a biological virus, outlook, been thrown in jail, or landscape, sometimes called this one entered a system, replicated been elected to parliament • take cyberspace.) The hacker is a tester of itself, and sent off copies to other your pick. limits, an uninvited guest in the sys­ computers. Many computers are tem . The system is a host to be linked together through networks While the Cold War which pushed to the limit but not such as Arpanet, which connects generated this particular incidence of destroyed. Landreth is very clear on eighty thousand computers. hacking might have changed, the the ethics of this kind of hacking: Computers have security systems issue of who gets access to the vast never destroy other people's data. to prevent noise of this sort getting in and powerful computer networks The hacker appears within the sys­ and ruining the system, but this virus which non around the globe is here to tem to look and learn, and to prompt infected some six thousand before stay. Perhaps a new geography of the host organism, the computer sys­ being brought under control. The information politics might take the tem and its system managers to react. virus had been designed to exploit a place in part, at least, of the old Cold Not all hackers are qui te so ethical, security loophole in the electronic War territories. however. Some leave behind logic mailing system. Over the next couple Clifford Stoll, the man who track­ bombs'. Clifford Stoll recounts an in­ of days, 'white hat* hackers battled ed down Markus Hess, has structive story in this regard in his this lone-gun 'black hat' across the Eioneered experimental study of book The Cuckoo's Nest. It starts United States. Some began unwind­ acking as a phenomenon and is one with a phone call at 2.25 am from ing the machine code discovering of the first to attempt to articulate Gene Miya at NASA Ames how it worked and what exactly it these issues for a wider audience in Laboratory: "Help! Our computers did. Others wrote 'patches' to cover his book The Cuckoo's Egg. (A are under attack". Stoll put the phone up the loopholes in the operating sys­ potted version also appeared on the down and it rang again. This time, tems the virus exploited. All this in­ popular ABC science snow Quantum when he picked it up, it just beeped. formation was exchanged across the in July.) It reads like a high power Morse code from his own computer country on electronic bulletin ALR: AUGUST 1W0 COLUMNS 47 boards. In the space of a couple of America, but also base computers in old boundaries and territories that days, all that was left to be dis­ Japan and Alaska - meant that used to characterise social life. These covered was who wrote it. It turned security would subsequently be logic bombs are programmed into out to be a student at Cornell Univer­ tightened on scientific computer net­ the information networks as an ac­ sity, Robert Morris jr, the son of the works and information would flow cidental byproduct. They are a Chief Scientist at the National Com­ more slowly. Hence, one can say that byproduct of the complexities of puter Security Centre, the only there is a broader, more abstract kind power in an information intensive public part of the shadowy National of logic bomb at work here: no matter world. They are an unconscious form Security Agency. The mob who are how open a network is, no matter of negation. They are the unintended supposed to set the standards of how democratic, somebody is being effects of planned rationality and the computer security. What a Freudian excluded. inevitable byproducts of conflict nightmare! As philosopher Michel Serres in­ within the institutions which govern Scientific computer systems tend sists, one only produces the passage cyberspace. In a world where the net­ to be very open networks, without of information between two people works are run by bureaucracies, and elaborate security precautions. This by excluding a third: by excluding worse, where information about our allowed Hess and Landreth and the the noise of other parties who want credit ratings, sexual preferences, virus to slip through a loophole in the to be heard. Noise will stmggle to political affiliations, work absentee net and get into scientific, medical enter the system, and for any number records and health are not even and even military computers, al­ of motives. The Russians want infor­ handled by bureaucrats but though not highly classified ones. mation. The hackers might want processed by machine, hacking be­ Networks rely on trust, or mutual money or glory or a good supply of comes both a threat to individual , consensus between users about the coke, or some kind of oedipal rup­ privacy and a tactic for breaking correct use of the system. While they ture, who knows? In any event tne through the secrecy of government are relatively democratic systems for ever-present threat of noise is the data and the patent and copyright those with access to them, many logic bomb within the system. The restrictions of the big corporations. people are excluded. Hence hacking etnical question is whether noise is A little disorder in the networks raises complex ethical and political always necessarily a bad thing, or might be essential to preserving problems, many of whicn were whether it has creative uses. liberty, and also for advancing the recently discussed on an electronic The idea of a logic bomb is useful tools and technologies of informa­ bulletin board for Harper's as a suggestive metaphor for how tion systems. As St Just put it: the , Magazine (March). complex information networks func­ disorder of today is the order of The fact that Hess had been tion -and dysfunction. There appear tomorrow. Or as one of the hackers through literally hundreds of com­ to be logic bombs in all kinds of in­ in Harper's said: 'There's a hacker puters on the extensive American formation networks that were not bom every minute". scientific and military networks-and consciously programmed. They are not just American computers in activated when noise traverses the McKenzie Wark. JUDY HORACEK TAe i<Jt(| of evolution as progress towards increasing perfection A as lony been discounted by enlightened thinkers. Now read on..
Recommended publications
  • A the Hacker
    A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • Combating Spyware in the Enterprise.Pdf
    www.dbebooks.com - Free Books & magazines Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you will find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE EBOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These eBooks are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our ebooks onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Using Deception to Enhance Security: a Taxonomy, Model, and Novel Uses Mohammed H
    Purdue University Purdue e-Pubs Open Access Dissertations Theses and Dissertations January 2015 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses Mohammed H. Almeshekah Purdue University Follow this and additional works at: https://docs.lib.purdue.edu/open_access_dissertations Recommended Citation Almeshekah, Mohammed H., "Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses" (2015). Open Access Dissertations. 1334. https://docs.lib.purdue.edu/open_access_dissertations/1334 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. Graduate School Form 30 Updated 1/15/2015 PURDUE UNIVERSITY GRADUATE SCHOOL Thesis/Dissertation Acceptance This is to certify that the thesis/dissertation prepared By Almeshekah, Mohammed Hamoud Entitled Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses For the degree of Doctor of Philosophy Is approved by the final examining committee: Eugene H. Spafford Co-chair Mikhail J. Atallah Co-chair Samuel S. Wagstaff, Jr Matt Bishop To the best of my knowledge and as understood by the student in the Thesis/Dissertation Agreement, Publication Delay, and Certification Disclaimer (Graduate School Form 32), this thesis/dissertation adheres to the provisions of Purdue University’s “Policy of Integrity in Research” and the use of copyright material. Eugene H. Spafford Approved by Major Professor(s): William Gorman July 20th, 2015 Approved by: Head of the Departmental
    [Show full text]
  • Automating Cyber Attacks
    Automating Cyber Attacks HYPE AND REALITY AUTHORS Ben Buchanan John Bansemer Dakota Cary Jack Lucas Micah Musser NOVEMBER 2020 Established in January 2019, the Center for Security and Emerging Technology (CSET) at Georgetown’s Walsh School of Foreign Service is a research organization fo- cused on studying the security impacts of emerging tech- nologies, supporting academic work in security and tech- nology studies, and delivering nonpartisan analysis to the policy community. CSET aims to prepare a generation of policymakers, analysts, and diplomats to address the chal- lenges and opportunities of emerging technologies. During its first two years, CSET will focus on the effects of progress in artificial intelligence and advanced computing. CSET.GEORGETOWN.EDU | [email protected] 2 Center for Security and Emerging Technology NOVEMBER 2020 Automating Cyber Attacks HYPE AND REALITY AUTHORS Ben Buchanan John Bansemer Dakota Cary Jack Lucas Micah Musser ACKNOWLEDGMENTS The authors would like to thank Perri Adams, Max Guise, Drew Lohn, Igor Mikolic-Torreira, Chris Rohlf, Lynne Weil, and Alexandra Vreeman for their comments on earlier versions of this manuscript. PRINT AND ELECTRONIC DISTRIBUTION RIGHTS © 2020 by the Center for Security and Emerging Technology. This work is licensed under a Creative Commons Attribution- NonCommercial 4.0 International License. To view a copy of this license, visit: https://creativecommons.org/licenses/by-nc/4.0/. Document Identifier: doi: 10.51593/2020CA002 Cover photo: KsanaGraphica/ShutterStock. Contents EXECUTIVE SUMMARY III INTRODUCTION V 1 | THE CYBER KILL CHAIN 1 2 | HOW MACHINE LEARNING CAN (AND CAN’T) 11 CHANGE OFFENSIVE OPERATIONS 3 | CONCLUSION: KEY JUDGMENTS 21 ENDNOTES 29 Center for Security and Emerging Technology i iv Center for Security and Emerging Technology Executive Summary acking is a well-established part of statecraft.
    [Show full text]
  • The Air Force Can Learn a Lot from What It Has Already Seen in Cyberspace. Old Lessons
    The Air Force can learn a lot from what it has already seen in cyberspace. Old Lessons, “New”By Rebecca Grant Domain Cape Cod radar tower in Massachusetts was a prototype for the SAGE air defense system. SAGE needed computers with memory, digital relays linking radar sites, and systems engineering to bring them together. 86 AIR FORCE Magazine / September 2013 ashington is once again strategic challenges, such as continental wrestling with how to tack- air defense in the 1950s and real-time le the military challenges command and control in the 1980s, of cyberspace. “The rise of fueled progress in the exploitation of Photos via MITRE Corp. cyber is the most striking cyberspace. development in the post-9/11 national In its infancy, the domain of cyber- Wsecurity landscape,” Chairman of the space did not look much like the clouds Joint Chiefs of Staff Army Gen. Martin and commons known around the globe E. Dempsey said in a June 27 speech at today. The special qualities of cyberspace the Brookings Institution. Dempsey said emerged only when computers gained about 4,000 new military cyber positions more memory and power and networks could be created. Perhaps 1,000 of those linked them together. may be within the Air Force. Responding to new growth in the In the (Cyber) Beginning cyber mission poses a challenge to the Back before social media, the World Air Force. Over the past decade, the Wide Web, the fi rst emails, and even USAF position has swung from taking before ARPAnet, the fi rst closed cy- a vigorous lead in the mission area to berspace system was the Air Force’s going slow on cyber—to avoid a po- Semi-automatic Ground Environment, tential “black hole” as Air Force Chief or SAGE.
    [Show full text]
  • Cyber Conflicts in International Relations: Framework and Case Studies
    Cyber Conflicts in International Relations: Framework and Case Studies Alexander Gamero-Garrido Engineering Systems Division Massachusetts Institute of Technology [email protected] | [email protected] Executive Summary Overview Although cyber conflict is no longer considered particularly unusual, significant uncertainties remain about the nature, scale, scope and other critical features of it. This study addresses a subset of these issues by developing an internally consistent framework and applying it to a series of 17 case studies. We present each case in terms of (a) its socio-political context, (b) technical features, (c) the outcome and inferences drawn in the sources examined. The profile of each case includes the actors, their actions, tools they used and power relationships, and the outcomes with inferences or observations. Our findings include: • Cyberspace has brought in a number of new players – activists, shady government contractors – to international conflict, and traditional actors (notably states) have increasingly recognized the importance of the domain. • The involvement of the private sector on cybersecurity (“cyber defense”) has been critical: 16 out of the 17 cases studied involved the private sector either in attack or defense. • All of the major international cyber conflicts presented here have been related to an ongoing conflict (“attack” or “war”) in the physical domain. • Rich industrialized countries with a highly developed ICT infrastructure are at a higher risk concerning cyber attacks. • Distributed Denial of Service (DDoS) is by far the most common type of cyber attack. • Air-gapped (not connected to the public Internet) networks have not been exempt from attacks. • A perpetrator does not need highly specialized technical knowledge to intrude computer networks.
    [Show full text]
  • APPENDICES a Participants
    APPENDICES A Participants Mack Alford Bernard Carre Ascent Logic Corporation (Southampton University) 180 Rose Orchard Way, Suite 200 Program Validation Ltd. San Jose, CA 95134, USA 26 Queen's Terrace ( 408) 943-0630 Southampton SOl lBQ UK J. Dave Andrews 011-44 703-330001 Andyne Computing Limited 544 Princess Street, Suite 202 Greg Chisholm Kingston, Ontario K7L 1C7 Argonne National Laboratory Canada EBR-11 Project (613) 548-4355 9700 S. Cass A venue Argonne, IL 60439, USA Kurt Asmis (708) 972-6815 Atomic Energy Control Board [email protected] 270 Albert Street Ottawa, Ontario KIP 5S9 Dan Craigen Canada Odyssey Research Associates 265 Carling Avenue, Suite 506 Graham Birtwistle Ottawa, Ontario IGS 2El 2500 University Drive Canada Computer Science Department (613) 238-7900 University of Calgary [email protected] Calgary, Alberta T2N 1N4 Canada John Gannon ( 403) 220-6055 National Science Foundation graham@cpsc. ucalgary.ca Room 401 1800 G Street, NW Robin Bloomfield Washington, DC 20550, USA Adelard 28 Rhondda Grove Susan Gerhart London E35AP, UK MCC, Software Technology Program (44) 1 318 7579 3500 West Balcones Center Drive [email protected]. uk (internet) Austin, TX 78759, USA gerhart%[email protected] Ricky W. Butler Mail Stop 130 Norm Glick NASA, Langley Research Center National Security Agency Hampton, VA 23665 9800 Savage Road USA Fort George Meade, MD 20755-6000 USA Martine Calve (310) 688-8448 Communications Security norm@cs. umd.edu Establishment P.O. Box 9703, Terminal Ottawa, Ontario KlG 3Z4 Canada 102 Joseph Goguen Keith Hanna Programming Research Group University of Kent University of Oxford Electronic Engineering Department 8-11 Keble Road Canterbury, Kent CT2 7NT, UK Oxford, OXl 3QD, UK 0227-764000 (865) 54328 [email protected] (internet) [email protected].
    [Show full text]
  • General Corporation Tax (GCT)
    CITY OF NEW YORK DEPARTMENT OF FINANCE 1998 - STOCK ALLOCATION BELOW 100 PERCENT REPORT NAME ISSUERS ALLOCATION PERCENT NAME ISSUERS ALLOCATION PERCENT #78 GIAC LEASING CORPORATION 1.33 A F FIRE PROTECTION CO INC 13.54 "K" LINE AIR SERVICE (U.S.A.) 23.80 A F LEWIS & CO OF NEW YORK 23.20 A B DISTRIBUTORS INC 92.94 A F SUPPLY CORP 82.38 A L SHET METAL FABRICATIONS 69.80 A FEIBUSCH CORP 83.30 A & B AGENCY 25.00 A FINE GAUGE INC 59.27 A & C MECHANICAL INC LONG IS 0.44 A FOSTER HIGGINS INC 16.05 A & D ENTERPRISES, INC 75.45 A G EDWARDS SONS INC 1.45 A & D MECHANICAL INC 65.57 A G H TRIMSOURCE INC 76.57 A & E BUSINESS ADVISORS INC 67.80 A G INTERNATIONAL INC 17.20 A & E DENTAL STUDIO INC 89.20 A G INTERTAINMENT 7.67 A & E MANAGEMENT SYST 2.00 A H ENGINEERS PC 97.22 A & F INSTALLATIONS INC 10.19 A H HARRIS SONS INC 0.17 A & J FIXTURES INC 10.20 A H SCHREIBER CO INC 24.04 A & J FIXTURES, INC. 5.81 A H SPORTSWEAR CO INC 69.19 A & J HEATING & AIR CONDITIONISERVICE 62.50 A H VIDEO SALES REPRESENTIVE 59.56 A & M BILLING CONSULTANTS INC 17.30 A HARTRODT VIA INC 63.60 A & M BRONX BAKING INC 24.95 A HELLER METALS CO INC 90.88 A & N DELIVERY SERVICE, INC. 10.09 A I & ASSOCIATES INC 5.08 A & R DEVELOPMENT INC 45.42 A I PROFESSIONAL CLEANING 88.00 A & R RECYCLING INC.
    [Show full text]
  • Introducción Al Movimiento Social Hacker (Traducción Del Inglés: Autor Desconocido, Posiblemente Norteamericano)
    A partir de la obra de Stewart, Charles, Smith, Craig, and Denton, Robert E. (1984) Persuasion and Social Movements. Waveland Press: Prospect Heights, Illinois, el autor trata de efectuar un análisis del movimiento social relacionado con las NNTT de la Información y la Comunicación: los denominados hackers, colectivo sobre el que todavía se tiene una imprecisa definición. En este texto se trata de iniciar un estudio del movimiento hacker a la luz del planteamiento teórico de los autores antes citados, como un novísimo movimiento social surgido a finales del siglo XX. J.R.O, mayo 2001 Introducción al movimiento social Hacker (Traducción del inglés: Autor desconocido, posiblemente norteamericano) Desde la introducción del ordenador personal a finales de los 70, la vocación por el hacking ha crecido no sólo en amplitud y miembros, sino que también ha cambiado la dinámica de la institución, como resultado del cambio del papel de la tecnología en la sociedad. Por tanto, la imagen publica del "típico" hacker se ha transformado de novato inocuo a tecno-criminal maligno. Alentado por el sensacionalismo de los medios y los celos colectivos, sus actividades han sido criminalizadas y ahora los hackers están siendo perseguidos por la ley a una escala desproporcionada a la amenaza actual que plantean. Los hackers quieren que sus motivaciones y éticas sean vistas como legitimas, o al menos entendidas, en vez de ser simplemente descritos como tortuosos adolescentes que no tienen nada mejor que hacer que joder cada uno de los ordenadores disponibles. A pesar de eso, no se han hecho muchas investigaciones sociológicas acerca de los hackers y su cultura.
    [Show full text]
  • NCSA Guide to Enterprise Security ______
    ____________________________________________________________________________________________ Copyright © 1995 M. E. Kabay. All rights reserved. Page 1 of 25 NCSA Guide to Enterprise Security _____________________________________________________________________________________________ LAST MODIFIED: October 3, 1995 NCSA Guide to Enterprise Security Table of Contents Objectives: ...................................................................................................................................... 3 What is enterprise systems security? .............................................................................................. 3 History............................................................................................................................................. 7 The mission ................................................................................................................................... 10 Definitions..................................................................................................................................... 10 Threats to security ......................................................................................................................... 12 The problem of ascertainment .................................................................................................. 12 Threats from insiders ................................................................................................................ 13 Threats from outsiders .............................................................................................................
    [Show full text]
  • Biomed Research International
    BioMed Research International Phoniatrics Guest Editors: Haldun Oguz, Markus Hess, and Adam M. Klein Phoniatrics BioMed Research International Phoniatrics Guest Editors: Haldun Oguz, Markus Hess, and Adam M. Klein Copyright © òýÔ Hindawi Publishing Corporation. All rights reserved. is is a special issue published in “BioMed Research International.” All articles are open access articles distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Contents Phoniatrics, Haldun Oguz, Markus Hess, and Adam M. Klein Volume òýÔ , Article ID Ô âýÔ¥, ò pages Automatic Prosodic Analysis to Identify Mild Dementia, Eduardo Gonzalez-Moreira, Diana Torres-Boza, Héctor Arturo Kairuz, Carlos Ferrer, Marlene Garcia-Zamora, Fernando Espinoza-Cuadros, and Luis Alfonso Hernandez-Gómez Volume òýÔ , Article ID ÀÔâç â, â pages Acoustic Correlates of Compensatory Adjustments to the Glottic and Supraglottic Structures in Patients with Unilateral Vocal Fold Paralysis, Luis M. T. Jesus, Joana Martinez, Andreia Hall, and Aníbal Ferreira Volume òýÔ , Article ID Þý¥ÔòÔ, À pages Spoken Word Recognition Errors in Speech Audiometry: A Measure of Hearing Performance?, Martine Coene, Anneke van der Lee, and Paul J. Govaerts Volume òýÔ , Article ID Àçò ÔÀ, pages Stem Cell erapy in Injured Vocal Folds: A ree-Month Xenogra Analysis of Human Embryonic Stem Cells, Bengt Svensson, Srinivasa R. Nagubothu, Christoer Nord, Jessica Cedervall, Isabell Hultman,
    [Show full text]