This paper presents research on computer security vulnerabilities in general-purpose network operating systems. The objective of this study is to investigate real intrusions in order to find and model the underlying generic weaknesses, i.e., weaknesses that would be applicable to many different systems. The paper is based on empirical data collected from three different systems, UNIX with NFS and NIS, Novell NetWare, and Windows NT. Five common security problems, improper input validation; improper use of cryptography; weak authentication; insecure bootstrapping; improper configuration, are identified, exemplified, and discussed from different perspectives. The work presented represents a further step towards a full understanding of the gen...
Modern operating systems have security threats from different perspectives, logging for instance. Lo...
This paper is a review of types of modification data attack based on computer systems and it explore...
In the recent years there have been a radical evolution in the aspects and requirements of network s...
This paper presents research on computer security vulnerabilities in general-purpose network operati...
Abstract: In this paper, we study the security evolution of Novell NetWare from version 3.12 until t...
This paper analyses security problems of modern computer systems caused by vulnerabilities in their ...
National Security Agency Although public awareness of the need for security in computing systems is ...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
This paper presents an intrusion experiment in which the target system was a Personal Computer netwo...
The increasing reliance on technology has made computer security a critical concern. With the rise o...
The security gains of intrusion-tolerant systems are directly dependent on the assumption that syste...
Nowadays many operating systems are including security features in order to prevent network attacks,...
Modern network systems have abundant trouble in security vulnerabilities like buffer overflow, bugs ...
The paper describes the possibilities of adding security extensions to operating systems based on th...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Modern operating systems have security threats from different perspectives, logging for instance. Lo...
This paper is a review of types of modification data attack based on computer systems and it explore...
In the recent years there have been a radical evolution in the aspects and requirements of network s...
This paper presents research on computer security vulnerabilities in general-purpose network operati...
Abstract: In this paper, we study the security evolution of Novell NetWare from version 3.12 until t...
This paper analyses security problems of modern computer systems caused by vulnerabilities in their ...
National Security Agency Although public awareness of the need for security in computing systems is ...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
This paper presents an intrusion experiment in which the target system was a Personal Computer netwo...
The increasing reliance on technology has made computer security a critical concern. With the rise o...
The security gains of intrusion-tolerant systems are directly dependent on the assumption that syste...
Nowadays many operating systems are including security features in order to prevent network attacks,...
Modern network systems have abundant trouble in security vulnerabilities like buffer overflow, bugs ...
The paper describes the possibilities of adding security extensions to operating systems based on th...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Modern operating systems have security threats from different perspectives, logging for instance. Lo...
This paper is a review of types of modification data attack based on computer systems and it explore...
In the recent years there have been a radical evolution in the aspects and requirements of network s...