The helminthiasis of the Internet

Computer Networks and ISDN Systems - Tập 22 - Trang 347-361 - 1991
Joyce K. Reynolds1
1USC/Information Sciences Institute, Marina del Rey, CA 90292, USA

Tài liệu tham khảo

Allman, 1983 Computer Professionals for Social Responsibility, 1989, CPSR statement on the computer virus, CPSR, Comm. ACM, 32, 699 DCA DDN Defense Communications System, 1989 Eichin, 1989 Eisenberg, 1989 Harner, 1990, Morris code, The New Republic, 202, 15 Harrenstein, 1977, NAME/FINGER 1989 1989, Comm. ACM, 32, 710 Massachusetts Institute of Technology, 1985 Massachusetts Institute of Technology, 1989, Comm. ACM, 32, 704 National Science Foundation, 1989, NSF poses code of networking ethics, Comm. ACM, 32, 688 Postel, 1982, Simple Mail Transfer Protocol, 10.17487/rfc0821 Reynolds, 1989, The helminthiasisof the Internet Seeley, 1989, A tour of the worm Spafford, 1989, The Internet worm program: an analysis, 19 Spafford, 1988, Purdue CS Technical Report CSD-TR-823 Agrawal, 1990, Integrating security with fault-tolerant distributed databases, Comput. J., 33, 71, 10.1093/comjnl/33.1.71 Al-Dossary, 1990, Computer virus protection and containment on mainframes, Comput. & Security, 9, 131, 10.1016/0167-4048(90)90085-8 Axelrod, 1989, Security during system recovery and repair, J. Inform. Systems Manage., 7, 42, 10.1080/07399019008968326 Alexander, 1989, A year later, Internet still under attack, Computerworld, 23, 1 Alexander, 1989, It's ba-a-ack: no nukes worm' haunts Internet, Computerworld, 23 Aucoin, 1989, Computer viruses: checklist for recovery, Comput. Libraries, 9, 4 Aucoin, 1989, Guarding against computer viruses: some general precautions, Comput. Libraries, 9, 24 Aviation Week & Space Technology, 1988, Rapid spread of virus confirms fears about danger to computers, Aviat. Week Space Technol., 129, 44 Bacon, 1989, Assessing public network security, Telecommunications, 23, 19 Badenhorst, 1989, Framework of a methodology for the life cycle of computer security in an organization, Comput. Security, 8, 433, 10.1016/0167-4048(89)90025-4 Barlow, 1990, Is computer hacking a crime?, Harper's, 280, 45 Barnes, 1989, Drawing the lines: changes in computer technology and law guarantee that resdistricting in the 1990s will be different and a more difficult game, Nat. J., 21, 787 Bear, 1980, Knowledge of computer ethics: its relationship to computer attitude and sociomoral reasoning, J. Educ. Comput. Res., 6, 77, 10.2190/3QJ0-P5B8-AELB-UGL7 Bellovin, 1989, Security problems in the TCP/IP protocol suite, Comput. Comm. Rev., 19, 32, 10.1145/378444.378449 Bellovin, 1988, The worm and the debug option, Vol. 7 Bender, 1978 Bidgoli, 1989, Computer security: new managerial concern for the 1990s and beyond, J. Systems Manage., 40, 21 Bloombecker, 1989, Short-circuiting computer crime, Datamation, 35, 71 Bloombecker, 1990 Bloombecker, 1988, Computer ethics for cynics, 18, 30 Bologna, 1988, Computer insecurities: an analysis of recent surveys on computer related crime and computer security, Data Proces. Comm. Security, 12 Bologna, 1989, The one minute fraud auditor, Comput. and Security, 8, 29, 10.1016/0167-4048(89)90035-7 Boston, 1988, Computer whiz puts virus in computers, Boston Herald, 1 Brand, 1990, Coping with the threat of computer security incidents: a primer from prevention through recovery, R. Brand Brenner, 1989, LAN security, LAN Mag. Brock, 1989, November 1988 Internet computer virus and the vulnerability of national telecommunications networks to computer viruses Brunner, 1975 Burger, 1988 Burstyn, 1990, RTM and the worm that ate internet, Harvard Mag., 92, 23 Campbell, 1989, The Internet worm: rethinking the security threat, Unisphere, 9, 44 Campbell, 1989, The Internet worm: rethinking the security threat, Unisphere, 9, 46 Campbell, 1989, The Internet worm: rethinking the security threat, 9, 48 Chain Store Age Executive, 1989, Retail technology: computer ‘viruses’, Chain Store Age Executive, 64, 67 Chese, 1989, Computer viruses and related threats to computer and network integrity, Comput. Networks ISDN Systems, 17, 141, 10.1016/0169-7552(89)90006-8 Christiansen, 1988, A matter of ethics, IEEE Spectrum, 25, 15 Cohen, 1989, Computational aspects of computer viruses, Comput. & Security, 8, 325, 10.1016/0167-4048(89)90089-8 Cohen, 1989, Models of practical defenses against computer viruses, Comput. & Security, 8, 149, 10.1016/0167-4048(89)90070-9 Colyer, 1988, Risks of unchecked input in C programs, Vol. 7 Commerce Clearing House, 1989, Guide to computer law, Topical Law Reports 1989, Comm. ACM, 32, 672, 10.1145/63526.315956 1989, Comm. ACM, 32, 1044, 10.1145/66451.315986 Computers & Security, 1989, Random bits & bytes, Comput. & Security, 8, 178, 10.1016/0167-4048(89)90100-4 Computer Law and Tax Report, 1988, Difficult to prosecute virus authors, Comput. Law Tax Rep., 15, 7 Computer Law and Tax Report, 1988, Virus bill introduced, Comput. Law Tax Rep., 15, 13 Computerworld, 1988, Computerworld, 157 Conly, 1989 Cornell Computer Science Department, 1987 Curry, 1990 Data Communications, 1988, Internet virus aftermath: is tighter security coming?, Data Commun., 17, 52 Dean, 1988, Was science-fiction novel germ of a computer virus?, Los Angeles Times, 1 Dean, 1988, Was science-fiction novel germ of a computer virus?, Los Angeles Times, 2 Dean, 1988, Was science-fiction novel germ of a computer virus?, Los Angeles Times, 3 Dean, 1988, Was science-fiction novel germ of a computer virus?, Los Angeles Times, 9 DeBow, 1989, Bankers review security procedures after virus attack, Comput. Banking, 6, 8 1988 Demaio, 1989, Viruses—a management issue, Comput. & Security, 8, 381, 10.1016/0167-4048(89)90018-7 Denning, 1989, The science of computing: the internet worm, Amer. Sci., 77, 126 Devoy, 1988, Media, file management schemes facilitate WORM utilization, Comput. Technol. Rev., 8 Dewdney, 1989, Computer recreations; of worms, viruses and core war, Sci. Amer., 10.1038/scientificamerican0889-102 Discover, 1989, Technology: communicable computer disease, Discover, 10, 64 El-Baghdadi, 1989, The pivotal role in computer security, Security Manage, 33, 63 Electronic Learning, 1989, Computer viruses: an epidemic real or imagined?, Electron. Learning, 8 Eloff, 1988, Computer security policy: important issues, Comput. & Security, 7, 559, 10.1016/0167-4048(88)90007-7 Ellis, 1989, Underwriting update-computer viruses: working out the bugs, Best's Rev., 90, 84 Elmer-DeWitt, 1988, Invasion of the data snatchers! — a ‘virus’ epidemic strikes TERROR in the Computer World, Time Mag. Technol. Sect., 62 Elmer-DeWitt, 1988, The kid put us out of action, Time Mag., 14, 76 Fainberg, 1989, The night the network failed, New Sci., 121, 38 Fenwick, 1985, Chair, Computer litigation, 1985: trial tactics and techniques Fifield, 1989, Smartcards outsmart computer crime, Comput. Security, 8, 10.1016/0167-4048(89)90107-7 Fisher, 1988, On the front lines in battling electronic invader, New York Times Fites, 1989 Forcht, 1989, Computer crime: assessing the lawyer's perspective, J. Business Ethics, 8, 10.1007/BF00383337 Friis, 1989, Is your PC infected?, ABA Banking J., 81, 49 U.S. General Accounting Office, 1989 Gardner, 1989, Computer Security, J. Inform. Systems Manage., 6, 42, 10.1080/07399018908960171 Gardner, 1989, The Internet worm: what was said and when, Comput. & Security, 8, 10.1016/0167-4048(89)90092-8 Gemignani, 1989, Viruses and criminal law, Comm. ACM, 32, 669 Gerlth, 1988, Intruders into computer systems still hard to prosecute, New York Times Gerrold, 1972 Gleissner, 1989, A mathematical theory for the spread of computer viruses, Comput. Security, 8, 35, 10.1016/0167-4048(89)90037-0 1989 Greenberg, 1989, Know thy viral enemy: it's more important than ever to guard your data and your system against infection by computer viruses, Byte, 14, 275 Greenia, 1989, Computer Security Information Sourcebook Griffith, 1990, The computer fraud and abuse act of 1986: a measured response to a growing problem, Vanderbilt Law Rev., 43, 453 Harvard College, 1987, Misuse of Computer Systems, 85 Hawkins, 1989, What Users Should Know About Computer Viruses, Telecommunications, North Amer. Edn., 23 Herrick, 1989, Computer viruses: prevention is better than cure, Accountant's Mag., 93, 24 Hertzoff, 1989, Layer your LAN, Security Manage, 33, 201 Highland, 1989, Reports from the victims, Comput. & Security, 8, 101, 10.1016/0167-4048(89)90062-X Hispanic Business, 1989, Consumer showcase: bits & bytes: from thunderstorms to disgruntled employees to computer viruses, a data system's vulnerability is often overlooked until disaster strikes, Hispanic Business, 11, 36 Hoffer, 1989, The 9 to 5 underground: are you policing computer crimes?, Sloan Manage. Rev., 30, 35 Hoffman, 1989, Risk analysis and computer security: towards a theory at last, Comput. & Security, 8, 23, 10.1016/0167-4048(89)90033-3 Hospitals, 1989, Information management: electronic computer viruses are not running rampant in hospital information systems, but health care executives are entirely too lax about computer system security, Hospital, 63, 64 1986 Hughes, 1986, The computer fraud and abuse act of 1986, Congressional Record (30 April 1986) Industry Week, 1989, Computer flu is after you, Industry Week, 238, 39 Information Executive, 1989, Promoting computer ethics: the next generation, Inform. Executive, 2, 42 Information Hotline, 1989, Plan to combat computer viruses, Inform. Hotline, 21, 10 Jamieson, 1989, Security and control issues in local area network design, Comput. Security, 8, 305, 10.1016/0167-4048(89)90087-4 Jander, 1989, The naked network, Comput. Decisions, 21, 39 Joyce, 1988, Time bomb: inside the Texas virus trial, Comput. Decisions, 20, 38 Keenan, 1989, Emerging vulnerabilities in office automation security, Comput. Security, 8, 223, 10.1016/0167-4048(89)90105-3 Kellam-Scott, 1989, Profile: Bellcore Computer and Network Security Symposium, Bellcore Exchange, 5, 24 Kent, 1990, E-mail privacy for the Internet: new software and strict registration procedures will be implemented this year, Business Comm. Rev., 20, 55 King, 1988, Overreaction to external attacks on computer systems could be more harmful than the viruses themselves, Chronicle Higher Educ., A36 King, 1988, Educom Bull., 23, 5 Kluepfel, 1989, Computer use and abuse: computer systems and their data are vulnerable to error, omission, and abuse, Security Manage, 33, 72 Kocher, 1989, A hygiene lesson, Comm. ACM, 32, 3, 10.1145/63238.315910 Kosko, 1989, Computer security experts advise steps to reduce the risk of virus attacks, Virus Discussion List Kruys, 1989, Security of open systems, Comput. & Security, 8, 139, 10.1016/0167-4048(89)90069-2 Lapsley, 1989, ‘We are under attack…’ (The Internet ‘worm’: a chronology), UNIX Rev., 7, 69 Lapsley, 1989, ‘We are under attack…’ (The Internet ‘worm’: a chronology), UNIX Rev., 7, 72 Lerner, 1989, Computer virus threatens to become epidemic, Aerospace Amer., 27, 14 Lewyn, 1988, ‘Scary’ virus clogs top Computers, USA Today, Sect. A, Col., 2, 1 Lu, 1989, Secure communications in Internet environments: a hierarchical key management scheme for end-to-end encryption, IEEE Trans. Comm., 37, 1014, 10.1109/26.41153 Lunt, 1989, Access control policies: some unanswered questions, Comput. & Security, 8, 43, 10.1016/0167-4048(89)90038-2 Lynn, 1989, Ethical responsibility key to computer security, Educ. Record, 70, 36 Machalow, 1989, Security for Lotus files, Comput. Libraries, 9, 19 Maher, 1989, Computer viruses: controller's nightmare, Manage. Accounting, 71, 44 Markoff, 1988, Author of computer ‘virus’ is son of U.S. electronic security expert, New York Times, A1 Markoff, 1988, Author of computer ‘virus’ is son of U.S. electronic security expert, New York Times, A7 Markoff, 1988, Computer experts say virus carried no hidden dangers, New York Times Markoff, 1988, Computer snarl: a ‘back door’ ajar, New York Times, B10 Markoff, 1988, Learning to love the computer whiz, New York Times Markoff, 1988, The computer jam: how it came about, New York Times Markoff, 1990, Ex-student faces trial over computer chaos, New York Times Markoff, 1990, Student says his error crippled Computers, New York Times Markoff, 1988, U.S. is moving to restrict access to facts about computer virus, New York Times, A28 Markoff, 1988, ‘Virus’ in military computers disrupts systems nationwide, New York Times Marshall, 1988, The worm's aftermath, Science, 242, 1121, 10.1126/science.242.4882.1121 Martin, 1989 Martin, 1989, Revenge of the nerds, Washington Monthly, 20, 21 McAfee, 1989, The virus cure, Datamation, 35, 29 McEwen, 1989 Menkus, 1989, It's time to rethink data processing fire protection, Comput. & Security, 8, 389, 10.1016/0167-4048(89)90019-9 Menkus, 1989, The computer virus situation is not encouraging, Comput. & Security, 8, 115, 10.1016/0167-4048(89)90066-7 Menkus, 1989, The employee's role in protecting information assets, Comput. & Security, 8, 487, 10.1016/0167-4048(89)90077-1 Menkus, 1989, Understanding password compromise, Comput. & Security, 7, 549, 10.1016/0167-4048(88)90004-1 Menkus, 1988, U. S. Government agencies belatedly address information system security issues, Comput. & Security, 7, 361, 10.1016/0167-4048(88)90575-5 Meredith, 1989, Cornell panel concludes morris responsible for computer worm, Cornell Chronicle Miller, 1989, Computer viruses, Business Economic Review, 35, 36 National Institute of Standards and Technology, 1989, Computer viruses and related threats: a management guide, NIST Special Publication 500-166 Mizock, 1986, Ethics—the guiding light of professionalism, Data management, 24 Modern Railroads, 1989, How to outwit computer ‘hackers’, Modern Railroads, 44, 40 Moir, 1989, Maintaining system security, Dr. Dobb's J. Software Tools for the Pro, 14, 75 Munro, 1988, Big guns take aim at virus, Government Comput. News, 7, 1 Munro, 1988, Big guns take aim at virus, Government Comput. News, 7, 100 National Computer Security Center, 1988 National, 1989, Computer Viruses and related threats: a management guide, NIST Special Publication 500-166 1988, Vol. 7 Newhouse News Service, 1988, Congressmen plan hearings on virus, Seattle Times, B2 NSF Network Service Center (NNSC), 1988 Ostapik, 1989, The effect of the internet worm on network and computer security, Connextions, 3, 16 Ostrow, 1988, Legal doubts rise in computer virus case, Los Angeles Times, 4 Page, 1988 Palmore, 1989, Computer bytes: viruses and vaccines, TechTrends, 34, 26, 10.1007/BF02782079 Parker, 1983 PC, 1988, ‘Worm’ Attacks National Network, PC Week, 8 Perry, 1988, Why software defects so often go undiscovered, Government Comput. News, 7, 85 Peterson, 1988, Worming into a computer's vulnerable core, Science News, 134, 10.2307/3972712 Phelps, 1989, Bug bytes, Security Manage., 33, 85 Presstime, 1989, Contagious communication, Presstime, 11 Resource Management, 1989, Computer viruses: background and recommendations for keeping software healthy are detailed, Resource Manage., 8 Richards, 1989, Top management's view of computer related fraud, Sig Security, Audit & Control Rev., 6, 34 Rivera, 1989, Computer viruses: a different perspective, Data Processing & Commun. Security, 13 Rowe, 1989, Avoiding computer viruses, Business Educ. Forum, 44, 17 Royko, 1988, Here's how to stop computer vandals, Chicago Tribune Rubin, 1989, Perimeter security for telecommunication with external entities, Internal Auditor, 46, 40 Rubin, 1988 Sampson, 1989, Computer viruses: not fads, not funny, Office, 110, 56 Samuelson, 1989, Can hackers be sued for damages caused by computer viruses?, Comm. ACM, 32, 666 Schneider, 1989, Computer viruses: what they are, how they work, how they might get you, and how to control them in academic institutions, Behav. Res. Methods, Instruments, & Comput., 21, 334, 10.3758/BF03205604 Schultz, 1989, Low cost security solutions for personal computers, Signal, 44, 71 Schweitzer, 1988 Seeley, 1989, Password cracking: a game of wits, Comm. ACM, 32, 700, 10.1145/63526.63529 Shadabuddin, 1989, Computer security problems and control techniques, Amer. Business Rev., 7, 14 Shaw, 1986, Computer Fraud and Abuse Act of 1986, Congressional Record (3 June 1986) Siegel, 1985 Sims, 1988, Researchers fear computer ‘virus’ will slow use of national network, New York Times Sitomer, 1986, Crooks find computers useful: terrorists see vulnerable targets, Christian Sci. Monitor, 79, 6 Slayden, 1989, Computer flu blues: computer managers must be ready to provide vaccines against infectious computer viruses, Security Manage., 33, 108 Spafford, 1989, Some musing on ethics and computer break-ins Spafford, 1989, Computer viruses: dealing with electronic vandalism and programmed threats, ADAPSO Spafford, 1989, The Internet worm: crisis and aftermath, Commun. ACM, 32, 689, 10.1145/63526.63527 Spafford, 1989, An analysis of the internet worm Spafford, 1988, A Cure!!!!!, Vol. 7 Spafford, 1988, A worm ‘condom’, Vol. 7 Steinberg, 1989, Developing a computer security charter, Sig Security, Audit & Control Rev., 6, 12 Stipp, 1988, New computer break-ins suggest ‘virus’ may have spurred hackers, Wall Street J. Stoll, 1988, How secure are computers in the U.S.A.?, Comput. & Security, 7, 543, 10.1016/0167-4048(88)90003-X Stoll, 1988, Stalking the wily hacker, Commun. ACM, 31, 484, 10.1145/42411.42412 Stoll, 1989 Stuller, 1989, Computer cops and robbers, Across the Board, 26 Tester, 1989, The key to data security, Security Manage., 33, 206 The Accountant, 1989, Computer viruses, The Accountant, 5829, 25 The Computer Lawyer, 1990, Criminal: computer fraud and abuse act developments, The Computer Lawyer, 7, 41 The Economist, 1989, Halting computer hackers, The Economist, 313, 18 The Engineer, 1989, Computer security, moves to outlaw computer hackers are being complicated by computer viruses, The Engineer, 268 The Engineer, 1988, Disk diseases, The Engineer, 267, 28 The New York Times, 1990, Computer ‘virus’ termed a mistake, New York Times The New York Times, 1988, Forgetfulness and the ‘virus’, New York Times The New York Times, 1988, Letter bomb of the computer age, New York Times The New York Times, 1990, Rogue program aided security, witness says, New York Times The Wall Street Journal, 1988, Spreading a virus, A Wall Street J. News Roundup Time Magazine, 1988, Letters Section, Poison program, Time Mag., 6 Tinto, 1989, Computer viruses: prevention, detection, and treatment, National Computer Security Center C1 Technical Report C1-001-89 Trible, 1986 United States, 1986 United, 1988 United States Congress House Committee on Science, Space, and Technology, Subcommittee on Transportation, Aviation, and Materials, 1989 United States Congress Senate Committee on the Judiciary, 1986 United States Congress Senate Committee on the Judiciary, 1986 United States Congress Senate Committee on the Judiciary, 1986 United States General Accounting Office, 1989, Computer security, GAO/IMTEC-89-57 United States of America, 1988 UNIX Today!, 1989, Uncle Sam's anti-virus Corps, UNIX Today!, 10 U.S. News & World Report, 1990, Computer hacking goes on trial. The Morris case is as much about culture clash as it is about computer security, U.S. News & World Rep., 108, 25 Vasilyev, 1989, Technology: computer viruses, Sov. Life, 394, 37 Wasik, 1989, Law reform proposals on computer misuse, Criminal Law Rev., 257 White, 1989, Viruses and worms: a campus under attack, Comput. & Security, 8, 283, 10.1016/0167-4048(89)90091-6 White, 1989, Coping with computer viruses and related problems, IBM Res. Rep. RC 14405 Wines, 1988, A family's passion for computers, gone sour, New York Times, 1 Wines, 1988, ‘Virus’ eliminated, defense aides say, New York Times Winter, 1988, Virus infects huge computer network, Chicago Tribune, 1 Wiseman, 1989, Preventing viruses in computer systems, Comput. Security, 8, 427, 10.1016/0167-4048(89)90024-2 Wood, 1989, Planning: a means to achieve data communications security, Comput. Security, 8, 189, 10.1016/0167-4048(89)90101-6 Yovel, 1989, Conquering computer viruses, Security Manage., 33, 189 Zajac, 1989, Disaster recovery—are you really ready?, Comput. & Security, 8, 297, 10.1016/0167-4048(89)90093-X Zajac, 1989, Legal options to computer viruses, Comput. Security, 8, 25, 10.1016/0167-4048(89)90034-5 Zajac, 1989, Viruses: should we quit talking about them, Comput. Security, 7, 471, 10.1016/0167-4048(88)90198-8