Stoll-clifford-books definition

In 1990, in his book The Cuckoo’s Egg, he suggested that automated data mining techniques could be used by Black Hat cyberterrorists to look for interesting patterns in large amounts of non-secure and apparently unrelated data. Thus, a financial institution may assume that its electronic fund transfer (EFT) system is the most vital information system to protect, but a cyberterrorist may want access to the financial records of only targeted individuals over some period of time. After entry to a system has been gained, the cyberterrorist may not alter data but simply decide to track funding sources (given the deposit records) to harm the targeted individual. In such a scenario, going into the financial institution to destroy information is only a short-term strategy that will do little more than garner too much attention. Following the popularity of Stoll’s The Cuckoo’s Egg, he wrote a second book entitled Silicon Snake Oil: Second Thoughts on the Information Highway. Stoll’s home page can be found at http:// www.ocf.berkeley.edu/~stoll/. Schell, B.H., Dodge, J.L., with S.S. Moutsatsos. The Hacking of America: Who’s Doing It, Why, and How. Westport, CT: Quorum Books, 2002.
0
0
Advertisement