Rule Based Analysis of Computer Security

Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly...

Full description

Bibliographic Details
Main Author: Baldwin, Robert W.
Published: 2023
Online Access:https://hdl.handle.net/1721.1/149665
_version_ 1826195064235229184
author Baldwin, Robert W.
author_facet Baldwin, Robert W.
author_sort Baldwin, Robert W.
collection MIT
description Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly writable and that mistake could allow ordinary users to acquire super-user privileges.
first_indexed 2024-09-23T10:06:46Z
id mit-1721.1/149665
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T10:06:46Z
publishDate 2023
record_format dspace
spelling mit-1721.1/1496652023-03-30T04:04:55Z Rule Based Analysis of Computer Security Baldwin, Robert W. Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly writable and that mistake could allow ordinary users to acquire super-user privileges. 2023-03-29T15:15:27Z 2023-03-29T15:15:27Z 1988-03 https://hdl.handle.net/1721.1/149665 18430081 MIT-LCS-TR-401 application/pdf
spellingShingle Baldwin, Robert W.
Rule Based Analysis of Computer Security
title Rule Based Analysis of Computer Security
title_full Rule Based Analysis of Computer Security
title_fullStr Rule Based Analysis of Computer Security
title_full_unstemmed Rule Based Analysis of Computer Security
title_short Rule Based Analysis of Computer Security
title_sort rule based analysis of computer security
url https://hdl.handle.net/1721.1/149665
work_keys_str_mv AT baldwinrobertw rulebasedanalysisofcomputersecurity