Firewall Wizards mailing list archives
Re: Security Policy methodologies
From: Aleph One <aleph1 () dfw net>
Date: Sat, 3 Jan 1998 13:09:30 -0600 (CST)
I suggest you read John D. Howard's PhD dissertation, "An Analysis Of Security Incidents On The Internet 1989 - 1995". It has some solid statistics and trend analysis on the incidents reported to CERT during that time period. It also contains an interesting attack taxonomy. But at about 300 pages it is not a one night read.
My apologies to all. I should have included the url. Here it is: http://www.cert.org/research/JHThesis/ Aleph One / aleph1 () dfw net http://underground.org/ KeyID 1024/948FD6B5 Fingerprint EE C9 E8 AA CB AF 09 61 8C 39 EA 47 A8 6A B8 01
Current thread:
- Re: Security Policy methodologies, (continued)
- Re: Security Policy methodologies Ted Doty (Jan 02)
- Re: Security Policy methodologies Aleph One (Jan 03)
- Re: Security Policy methodologies Marcus J. Ranum (Jan 03)
- Re: Security Policy methodologies Ted Doty (Jan 05)
- Re: Security Policy methodologies Aleph One (Jan 05)
- Re: Security Policy methodologies Ted Doty (Jan 05)
- Re: Security Policy methodologies Larry J. Hughes Jr. (Jan 06)
- Re: Security Policy methodologies Rick Smith (Jan 07)
- Re: Security Policy methodologies Ted Doty (Jan 07)
- Re: Security Policy methodologies Aleph One (Jan 03)
- Re: Security Policy methodologies Ted Doty (Jan 02)
- Survey so far - Security Policy methodologies Bret Watson (Jan 04)