Unit 1-1 Trusted Computer Systems [Compatibility Mode]

Unit 1-1 Trusted Computer Systems [Compatibility Mode] -...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 12/19/2010 1 Trusted Computer Systems Trusted Computer Systems Unit 1- Part 1 Click Here To Start Audio History of Operating Systems History of Operating Systems c 1940s - Dedicated c 1950s - Batch c 1960-70s - General Purpose (360,Multics) c 1980-90s - Personal Computers c 1980-2000s - Network OSs Department of Defense Department of Defense c Increased Reliance on Computer Technology During Cold War c Popular Movies like War Games Increased Awareness c Tiger Teams set up to crack Government Systems 12/19/2010 2 Tiger Teams Tiger Teams c Found weaknesses in administration (e.g., default passwords, womens names) c Found weaknesses on OS (e.g., password buffers, readable password files) c Unprotected backdoors Technology Growth Made Technology Growth Made Things Worse Things Worse c Software became widely available. c Expertise to hack systems proliferated. c Third Party Software became integral to all Government Functions (e.g., Microsoft) Opportunity for Abuse...
View Full Document

This note was uploaded on 02/20/2011 for the course TECH 7375 taught by Professor June during the Spring '11 term at University of Arkansas for Medical Sciences.

Page1 / 5

Unit 1-1 Trusted Computer Systems [Compatibility Mode] -...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online