Rule Based Analysis of Computer Security
Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly...
Main Author: | |
---|---|
Published: |
2023
|
Online Access: | https://hdl.handle.net/1721.1/149665 |
_version_ | 1826195064235229184 |
---|---|
author | Baldwin, Robert W. |
author_facet | Baldwin, Robert W. |
author_sort | Baldwin, Robert W. |
collection | MIT |
description | Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly writable and that mistake could allow ordinary users to acquire super-user privileges. |
first_indexed | 2024-09-23T10:06:46Z |
id | mit-1721.1/149665 |
institution | Massachusetts Institute of Technology |
last_indexed | 2024-09-23T10:06:46Z |
publishDate | 2023 |
record_format | dspace |
spelling | mit-1721.1/1496652023-03-30T04:04:55Z Rule Based Analysis of Computer Security Baldwin, Robert W. Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly writable and that mistake could allow ordinary users to acquire super-user privileges. 2023-03-29T15:15:27Z 2023-03-29T15:15:27Z 1988-03 https://hdl.handle.net/1721.1/149665 18430081 MIT-LCS-TR-401 application/pdf |
spellingShingle | Baldwin, Robert W. Rule Based Analysis of Computer Security |
title | Rule Based Analysis of Computer Security |
title_full | Rule Based Analysis of Computer Security |
title_fullStr | Rule Based Analysis of Computer Security |
title_full_unstemmed | Rule Based Analysis of Computer Security |
title_short | Rule Based Analysis of Computer Security |
title_sort | rule based analysis of computer security |
url | https://hdl.handle.net/1721.1/149665 |
work_keys_str_mv | AT baldwinrobertw rulebasedanalysisofcomputersecurity |