**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 2, Issue #2.18 (December 28, 1990) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith PERIPATETIC GADFLY: Brendan Kehoe USENET readers can currently receive CuD as alt.society.cu-digest. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors, however, do copyright their material, and those authors should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ------------------------------ Date: Thu, 6 Dec 90 15:00:32 PST From: Peter Denning Subject: Computers Under Attack ******************************************************************** *** CuD #2.18: File 3 of 5: Computers Under Attack *** ******************************************************************** COMPUTERS UNDER ATTACK Intruders, Worms, and Viruses Edited by Peter J. Denning ACM Press and Addison-Wesley, 1990, 554pp $18.50 ACM members, $20.50 others On behalf of ACM Press and the authors of the 38 articles brought together in this edition, I am proud to announce that our book on the subject of attacks on computers is now available. This subject continues to receive ongoing attention in the national press --for example, the recent discovery of $12M of toll fraud at the NASA Johnson Space Center, Operation Sun Devil, an Esquire article about computer pirates breaking in to the Bell System, and the recent splashy appearance of the NRC report, "Computers at Risk". The purpose of this book is to tell the story of attacks on computers in the words of those who are making the story and who see the broad perspective in which it is taking place. We have painstakingly selected the articles and have provided connective material to bring out the global context and show that the problem is not purely technology, not purely people, but a product of the interaction between people and computers in a growing worldwide network. After and introduction and preface by me, the articles are arranged in six parts. Most of these have been previously published, but there are a few new pieces specifically commissioned for this volume. PART I: THE WORLDWIDE NETWORK OF COMPUTERS Worldnet and ARPANET by Denning, overview of networks by Quarterman, reflections by Thompson, survey of computer insecurities by Witten. PART II: INTRUDERS Reflections by Reid, Wily hacker story by Stoll, a followup commentary by Mandel, and a business perspective by Wilkes. PART III: WORMS Internet worm overview by Denning, perspectives on the Morris worm by MIT's Rochlis et al, Purdue's Spafford, and Utah's Seeley, executive summary of Cornell Report, Morris indictment and trial summary by Montz, original worm paper by Shoch and Hupp. PART IV: VIRUSES Virus overview by Denning, BRAIN and other virus operation by Highland, virus primer by Spafford et al, viral protection in MS/DOS by Brothers, and a perspective on viruses by Cohen. PART V: COUNTERCULTURES Computer property rights by Stallman, cyberspace literature by Paul Saffo, a dialog on hacking and security by Dorothy Denning and Frank Drake. PART VI: SOCIAL, LEGAL, AND ETHICAL IMPLICATIONS A spectrum of commentaries: moral clarity and sending a signal by Denning, global city by Morris, virus bills in congress by Crawford, GAO report summary, legal issues by Samuelson and by Gemingani, computer emergency response by Scherlis et al, ethics statements by various organizations, ACM President's letters by Kocher, ACM forum letters, law and order for the PC by Director, RISKS perspectives by Neumann, crimoids by Parker. To order the book, run to your local bookstore or call ACM Press Order Department. For credit card orders only call 800-342-6626 or in Maryland and outside the continental US call 301-528-4261 and for mail orders ACM Order Department, P. O. Box 64145, Baltimore, MD 21264. The price for ACM members is $18.50 and for nonmembers $20.50. Shipping is extra unless you send a check to the order department. BE SURE TO INCLUDE YOUR ACM MEMBER NUMBER AND THE BOOK ORDER NUMBER (706900). ******************************************************************** >> END OF THIS FILE << ***************************************************************************  Downloaded From P-80 International Information Systems 304-744-2253 12yrs+