Computer Insecurity


Click here to start

Table of Contents

Computer Insecurity

The Internet Worm-- 10 Years After

How the Worm Spread

Back Doors


Transitive Trust

Buffer Overflow

Why Does This Happen?

Time to Market Wins

Mobile Code

Why Use Mobile Code?

What Can we Do?

PPT Slide

Vulnerable Clients

Where’s the Firewall?


Why Isn’t Crypto Used?

Cryptography is Hard

Going Around Security

Bounding Insecurity

Moving Insecurity

The Systems Perspective

Building Secure Systems

Author: Steven M. Bellovin


Home Page:

Download presentation source