Rule Based Analysis of Computer Security

Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly...

Full description

Bibliographic Details
Main Author: Baldwin, Robert W.
Published: 2023
Online Access:https://hdl.handle.net/1721.1/149665
Description
Summary:Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly writable and that mistake could allow ordinary users to acquire super-user privileges.