logodl
arrow Communications of the ACM
 
arrow Volume 31 , Issue 5 (1988)

access SIGs conferences publication page subscription page

Stalking the wily hacker
Pages 484-497

Clifford Stoll

metadata:   abstract index terms  
rule rule rule rule
full text:   pdf 1559 KB


back to top
blue HR

ABSTRACT

An astronomer-turned-sleuth traces a German trespasser on our military networks, who slipped through operating system security holes and browsed through sensitive databases. Was it espionage?


back to top
blue HR

INDEX TERMS

Categories and Subject Descriptors:
Computer Systems Organization -Computer-Communication Networks - General (C.2.0): Security and protection (e.g., firewalls); Computer Systems Organization -Computer-Communication Networks - Network Operations (C.2.3): Network monitoring; Computer Systems Organization -Computer-Communication Networks - Network Operations (C.2.3): Public networks; Computing Milieux -Computers and Society - Public Policy Issues (K.4.1): Transborder data flow; Computing Milieux -Computers and Society - Social Issues (K.4.2): Abuse and crime involving computers**; Computing Milieux -Management of Computing and Information Systems - Miscellaneous (K.6.m): Security*; Computing Milieux -The Computing Profession - Miscellaneous (K.7.m): Ethics**;

General Terms:
Management, Security




blue HR