This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 12/19/2010 1 Trusted Computer Systems Trusted Computer Systems Unit 1- Part 1 Click Here To Start Audio History of Operating Systems History of Operating Systems c 1940s - Dedicated c 1950s - Batch c 1960-70s - General Purpose (360,Multics) c 1980-90s - Personal Computers c 1980-2000s - Network OSs Department of Defense Department of Defense c Increased Reliance on Computer Technology During Cold War c Popular Movies like War Games Increased Awareness c Tiger Teams set up to crack Government Systems 12/19/2010 2 Tiger Teams Tiger Teams c Found weaknesses in administration (e.g., default passwords, womens names) c Found weaknesses on OS (e.g., password buffers, readable password files) c Unprotected backdoors Technology Growth Made Technology Growth Made Things Worse Things Worse c Software became widely available. c Expertise to hack systems proliferated. c Third Party Software became integral to all Government Functions (e.g., Microsoft) Opportunity for Abuse...
View Full Document
This note was uploaded on 02/20/2011 for the course TECH 7375 taught by Professor June during the Spring '11 term at University of Arkansas for Medical Sciences.
- Spring '11