Proceedings of the May 19-22, 1975, National Computer Conference and Exposition on - AFIPS '75 1975
DOI: 10.1145/1499949.1500018
|View full text |Cite
|
Sign up to set email alerts
|

Operating system penetration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2002
2002
2018
2018

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(31 citation statements)
references
References 13 publications
0
31
0
Order By: Relevance
“…The flaw hypothesis methodology [1] is a structured technique for performing penetration studies. It is most effective when done in the environment in which the system is to be used; then policies and procedures will affect the results, either for better or for worse.…”
Section: The Flaw Hypothesis Methodologymentioning
confidence: 99%
“…The flaw hypothesis methodology [1] is a structured technique for performing penetration studies. It is most effective when done in the environment in which the system is to be used; then policies and procedures will affect the results, either for better or for worse.…”
Section: The Flaw Hypothesis Methodologymentioning
confidence: 99%
“…Penetration testing is a fundamental area of information system security engineering (Linder, 1975). After a successful attack, the tester is able to illegitimately acquire illegitimate authority in computer system (Geer & Harthorne, 2002).…”
Section:  Other Countermeasuresmentioning
confidence: 99%
“…"bogus" user accounts with "magic" passwords, etc.) [19]. None of them is sufficient alone, since it addresses a specific type of threats.…”
Section: Related Workmentioning
confidence: 99%