Inicio Nosotros Búsquedas
Buscar en nuestra Base de Datos:     
Autor: Bellovin, Steven M. (Comienzo)
2 registros cumplieron la condición especificada en la base de información BIBCYT. ()
Registro 1 de 2, Base de información BIBCYT
Publicación seriada
Referencias AnalíticasReferencias Analíticas
Autor: Bellovin, Steven M. smb@research.att.com
Oprima aquí para enviar un correo electrónico a esta dirección
Título: Computer Security-An End State?
Páginas/Colación: pp.131-132.; 28cm.; il.
Communications of the ACM Vol. 44, no. 3 March 2001
Información de existenciaInformación de existencia

Resumen
The article focuses on computer security systems and prevention of computer hacking. Most security problems are caused by buggy software, which is the oldest unsolved problem in computer science. A secure computer system cannot be built without building correct systems that are hack-resistant. The primary challenge is to learn how to build hack-resistant systems that can cope with the failure, under attack, of some components. Another issue in this area is of simplifying security-critical programs. Only possible solutions for the security of complex components are to split off the security-sensitive pieces into small, auditable modules, or to provide new operating system primitives that will have the same effect. There are other approaches to address the security issue, like building fault-tolerant systems out of unreliable components. Fault-tolerant systems, however, deal with natural failures, and hackers do their best to shift odds and to create improbable situations they can exploit. If these challenges are met then networks would be able to survive and even flourish.

Registro 2 de 2, Base de información BIBCYT
Publicación seriada
Referencias AnalíticasReferencias Analíticas
Autor: Bellovin, Steven M. smb@research.att.com
Oprima aquí para enviar un correo electrónico a esta dirección
Título: Spamming, Phishing, Authentication, and Privacy
Páginas/Colación: p. 144.; 28cm.
Communications of the ACM Vol. 47, no. 12 December 2004
Información de existenciaInformación de existencia

Resumen
This article reports that unsolicited commercial email, or spam, peddles a variety of dubious products, ranging from pharmaceuticals to abandoned bank accounts. The so-called "phishers" try to steal user names and passwords for online banking. And then, systems are infested with viruses, worms and other malware. Although there are would-be solutions to these problems, some of them have the potential to do far more harm than good. An obvious approach to spam fighting is some form of sender authentication. Authenticated email solves some problems. If nothing else, it hinders the spread of email worms, since the infected machine will be positively identified. Furthermore, there are some situations where a list of permitted senders is in fact used. In the best of these schemes, purported identity is used to drive some sort of challenge and response scheme. Authenticated email would provide some protection here, though even without it successful "joe jobs" forgery of a legitimate user's identity are relatively uncommon.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

UCLA - Biblioteca de Ciencias y Tecnologia Felix Morales Bueno

Generados por el servidor 'bibcyt.ucla.edu.ve' (18.227.46.29)
Adaptive Server Anywhere (07.00.0000)
ODBC
Sesión="" Sesión anterior=""
ejecutando Back-end Alejandría BE 7.0.7b0 ** * *
18.227.46.29 (NTM) bajo el ambiente Apache/2.2.4 (Win32) PHP/5.2.2.
usando una conexión ODBC (RowCount) al manejador de bases de datos..
Versión de la base de información BIBCYT: 7.0.0 (con listas invertidas [2.0])

Cliente: 18.227.46.29
Salida con Javascript


** Back-end Alejandría BE 7.0.7b0 *