Map
Index
Random
Help
th

Quote: easily attacked Multics security via hardware, software, and procedures; extracted or modified sensitive data without detection; 250 manhours of effort

topics > all references > references i-l > QuoteRef: kargPA6_1974 , p. 131



Topic:
limitations of system security
Topic:
security leaks and weaknesses

Quotation Skeleton

The [security analysis of Multics] was to be carried out on … a goal of one vulnerability per security control … [hardware, software, procedures] was set … An attempt was to be made to operate … each penetration, an attempt would be made to … exploitations were successfully investigated. These included changing access … and accessing the system password file. … [p. 144, the total cost was approximately 257 manhours].   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: limitations of system security (32 items)
Topic: security leaks and weaknesses (56 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.