Generated Fri Oct 22 07:13:05 PDT 1999 by

  • [Neumann89] P. Neumann and D. Parker, A Summary of Computer Misuse Techniques, Proceedings of the 12th National Computer Conference, Oct. 1989. [This paper summarized computer misuse techniques and characterizes them as comprised of the classes of; external misuse, hardware misuse, masquerading, setting up subsequent misuse, bypassing intended controls, active misuse of a resource, passive misuse of a resource, misuse resulting from inaction, and use as aide to other misuse.]