메뉴 건너뛰기




Volumn 27, Issue 5, 2012, Pages 781-799

Cybersecurity: A pre-history

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84867297056     PISSN: 02684527     EISSN: 17439019     Source Type: Journal    
DOI: 10.1080/02684527.2012.708530     Document Type: Article
Times cited : (56)

References (49)
  • 3
    • 84976815513 scopus 로고
    • See also, 967 Spring Joint Computer Conference, AFIPS Proa, (accessed 26 September 2011)
    • See also, B. Peters, 'Security Considerations in a Multi-programmed Computer System', 1967 Spring Joint Computer Conference, AFIPS Proa, vol 30, 1967, pp.283-6 http://dl.acm.org/citation.cfm?id=1465524&dl=ACM&coll=DL&CFID=44685134&CFTOKEN=30141640 (accessed 26 September 2011).
    • (1967) Security Considerations In a Multi-programmed Computer System , vol.30 , pp. 283-286
    • Peters, B.1
  • 4
    • 84867283197 scopus 로고    scopus 로고
    • remarks at the 1967 Spring Joint Computer Conference, (accessed 26 September 2011)
    • Willis H. Ware, 'Security and Privacy in Computer Systems', remarks at the 1967 Spring Joint Computer Conference, p.11 http://www.rand.org/content/dam/rand/pubs/papers/2005/P3544.pdf (accessed 26 September 2011)
    • Security and Privacy In Computer Systems , pp. 11
    • Ware, W.H.1
  • 6
    • 84867321117 scopus 로고
    • EDV abgezapft
    • 14 April, (accessed 26 September 2011)
    • 'EDV abgezapft', Der Spiegel, 14 April 1969 http://www.spiegel.de/spiegel/print/d-45702341.html (accessed 26 September 2011)
    • (1969) Der Spiegel
  • 7
    • 0001712220 scopus 로고    scopus 로고
    • The ubiquitous Markus Wolf sheds additional light on this operation in Markus Wolf with, (New York: PublicAffairs
    • The ubiquitous Markus Wolf sheds additional light on this operation in Markus Wolf with Anne McElvoy, Man Without a Face: The Autobiography of Communism's Greatest Spymaster (New York: PublicAffairs 1997) p.201.
    • (1997) Man Without a Face: The Autobiography of Communism's Greatest Spymaster , pp. 201
    • McElvoy, A.1
  • 8
    • 0006291871 scopus 로고
    • Report of the Defense Science Board Task Force on Computer Security, [the Ware Report], published by RAND for the Office of the Director of Defense Research, 11 February, (accessed 26 September 2011)
    • Report of the Defense Science Board Task Force on Computer Security, Security Controls for Computer Systems [the Ware Report], published by RAND for the Office of the Director of Defense Research, 11 February 1970 http://seclab.cs.ucdavis.edu/projects/history/papers/ware70.pdf (accessed 26 September 2011).
    • (1970) Security Controls For Computer Systems
  • 9
    • 84867283194 scopus 로고
    • Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard
    • US Senate, Select Committee on Intelligence, April, (accessed 26 September 2011)
    • US Senate, Select Committee on Intelligence, 'Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard', Staff Report, April 1978 http://intelligence.senate.gov/pdfs/95nsa.pdf (accessed 26 September 2011).
    • (1978) Staff Report
  • 10
    • 3943108716 scopus 로고
    • Computer Security: The Achilles' Heel of the Electronic Air Force?
    • January/February, (accessed 26 September 2011)
    • Roger R. Schell, 'Computer Security: The Achilles' Heel of the Electronic Air Force?', Air University Review January/February (1979) http://www.airpower.maxwell.af.mil/airchro-nicles/aureview/1979/jan-feb/schell.html#schell (accessed 26 September 2011).
    • (1979) Air University Review
    • Schell, R.R.1
  • 12
    • 0004170717 scopus 로고
    • During the Cuban Missile Crisis in 1962, for example, an exercise tape inadvertently fed into an operational computer briefly made American radar operators believe they were tracking a missile; see, (Princeton: Princeton University Press
    • During the Cuban Missile Crisis in 1962, for example, an exercise tape inadvertently fed into an operational computer briefly made American radar operators believe they were tracking a missile; see Scott D. Sagan, The Limits of Safety: Organisations, Accidents, and Nuclear Weapons (Princeton: Princeton University Press 1993), pp.238-41
    • (1993) The Limits of Safety: Organisations, Accidents, and Nuclear Weapons , pp. 238-241
    • Sagan, S.D.1
  • 13
    • 84867321129 scopus 로고
    • US Congress, General Accounting Office (Comptroller General), report to the Chairman of the Committee on Government Operations [Rep. Jack Brooks], 15 May, (accessed 26 September 2011)
    • US Congress, General Accounting Office (Comptroller General), report to the Chairman of the Committee on Government Operations [Rep. Jack Brooks], 'NORAD's Missile Warning System: What Went Wrong?', 15 May 1981, p.13 http://archive.gao.gov/f0102/115265.pdf (accessed 26 September 2011).
    • (1981) NORAD's Missile Warning System: What Went Wrong? , pp. 13
  • 15
    • 0003726032 scopus 로고
    • notes that the salience of the, incident is that NORAD reported it to the Pentagon in real time; earlier such mishaps had been contained at the individual tracking sites
    • Sagan, The Limits of Safety, notes that the salience of the 1979 incident is that NORAD reported it to the Pentagon in real time; earlier such mishaps had been contained at the individual tracking sites.
    • (1979) The Limits of Safety
    • Sagan1
  • 16
    • 0003640065 scopus 로고
    • Reagan enjoyed a private screening of WarGames the weekend it opened; his recounting of it is from, (New York: PublicAffairs
    • Reagan enjoyed a private screening of WarGames the weekend it opened; his recounting of it is from Lou Cannon, President Reagan: The Role of Lifetime (New York: PublicAffairs 1991) p.38.
    • (1991) President Reagan: The Role of Lifetime , pp. 38
    • Cannon, L.1
  • 17
    • 84867326084 scopus 로고
    • Computer Security Worries Military Experts
    • 25 September
    • William. J. Broad, 'Computer Security Worries Military Experts', New York Times, 25 September 1983.
    • (1983) New York Times
    • Broad, W.J.1
  • 18
    • 84867283755 scopus 로고
    • National Security Decision Directive 145, 17 September, (accessed 11 February 2009). NSA's concerns over the security of government networks already dated back more than a decade. The Agency had created a Computer Security Center (CSC) in 1981 to guard Department of Defense systems, and it responded to NSDD-145 by transforming CSC into the National Computer Security Center
    • National Security Decision Directive 145, 'National Policy on Telecommunications and Automated Information Systems Security', 17 September 1984 http://www.fas.org/irp/offdocs/nsddl45.htm (accessed 11 February 2009). NSA's concerns over the security of government networks already dated back more than a decade. The Agency had created a Computer Security Center (CSC) in 1981 to guard Department of Defense systems, and it responded to NSDD-145 by transforming CSC into the National Computer Security Center
    • (1984) National Policy On Telecommunications and Automated Information Systems Security
  • 20
    • 84867321123 scopus 로고
    • Computer Security Shift is Approved by Senate
    • 24 December
    • Linda Greenhouse, 'Computer Security Shift is Approved by Senate', New York Times, 24 December 1987
    • (1987) New York Times
    • Greenhouse, L.1
  • 21
    • 84961772683 scopus 로고
    • The National Guards
    • May
    • Donald Goldberg, 'The National Guards', OMNI Magazine, May 1987.
    • (1987) OMNI Magazine
    • Goldberg, D.1
  • 24
    • 84867298027 scopus 로고
    • House Committee on Government Operations, Committee on Science, Space, and Technology, Report to accompany H.R. 145, June 11, (accessed 26 September 2011)
    • House Committee on Government Operations, Committee on Science, Space, and Technology, Computer Security Act of 1987, Report to accompany H.R. 145, June 11, 1987 http://csrc.nist.gov/groups/SMA/ispab/documents/csa_87.txt (accessed 26 September 2011).
    • (1987) Computer Security Act of 1987
  • 25
    • 84867321118 scopus 로고
    • National Security Directive 42, 'National Policy for the Security of National Security Telecommunications and Information Systems', 5 July, (accessed 26 September
    • Greenhouse, 'Computer Security Shift is Approved by Senate'. National Security Directive 42, 'National Policy for the Security of National Security Telecommunications and Information Systems', 5 July 1990 http://www.fas.org/irp/offdocs/nsd/nsd42.pdf (accessed 26 September 2011).
    • (1990) Computer Security Shift is Approved By Senate
    • Greenhouse1
  • 26
    • 0004182242 scopus 로고
    • (Seattle: Boeing, 1 July, Thinkers in the Soviet Union seemed to pondered similar ideas, like the notion of 'reflexive control', at roughly the same time
    • Thomas P. Rona, 'Weapon Systems and Information War' (Seattle: Boeing, 1 July 1976) p.50 http://www.google.com/url?sa=t&rct=j&q=thomas%20p.%20rona%2C%20%E2%80%98weapon%20systems%20and%20information%20war%E2%80%99%20(seattle%3A%20boeing%2C%201%20july%201976)%20p.50.&source=web&cd=l&sqi=2&ved=0CFEQFjAA&url=http%3A%2F%2Fwww.dod.mil%2Fpubs%2Ffoi%2Fhomeland_defense%2Fmissile_defense_agency%2F09-F-0070WeaponSystems_and_Information_War.pdf&:ei=4NkWUJaKKeHr6wHmyoHoDg&usg=AFQjCNGGlcfmXsy_BqwAWZre8AOrUN_pGg&cad=rja. Thinkers in the Soviet Union seemed to pondered similar ideas, like the notion of 'reflexive control', at roughly the same time
    • (1976) Weapon Systems and Information War , pp. 50
    • Rona, T.P.1
  • 29
    • 84867321121 scopus 로고
    • (Moscow: Military Publishing House, Brusnitsin, a lieutenant general, was then Deputy Chairman of the State Technical Commission of the USSR
    • Nikolai Brusnitsin, Openness and Espionage (Moscow: Military Publishing House 1990), pp.28-9. Brusnitsin, a lieutenant general, was then Deputy Chairman of the State Technical Commission of the USSR.
    • (1990) Openness and Espionage , pp. 28-29
    • Brusnitsin, N.1
  • 30
    • 84867326085 scopus 로고
    • Chairman of the Joint Chiefs of Staff, Memorandum of Policy 30, 8 March, (accessed 26 September 2011)
    • Chairman of the Joint Chiefs of Staff, Memorandum of Policy 30, 'Command and Control Warfare', 8 March 1993 http://dodreports.com/pdf/ada389344.pdf (accessed 26 September 2011).
    • (1993) Command and Control Warfare
  • 31
    • 0242381404 scopus 로고
    • Secretary of the Air Force and Chief of Staff of the Air Force, (accessed 26 September 2011)
    • Secretary of the Air Force and Chief of Staff of the Air Force, 'Cornerstones of Information Warfare', 1995 http://www.c4i.org/cornerstones.html (accessed 26 September 2011)
    • (1995) Cornerstones of Information Warfare
  • 33
    • 84867295009 scopus 로고
    • The Challenge of Information Warfare
    • Spring, (accessed 14 September 2011)
    • Wang Pufeng, 'The Challenge of Information Warfare', China Military Science, Spring 1995 http://www.fas.org/irp/world/china/docs/iw_mg_wang.htm (accessed 14 September 2011).
    • (1995) China Military Science
    • Pufeng, W.1
  • 34
    • 84905321169 scopus 로고    scopus 로고
    • Information War: A New Form of People's War
    • 25 June, (accessed 14 September 2011)
    • Wei Jincheng, 'Information War: A New Form of People's War', Liberation Army Daily, 25 June 1996 http://www.fas.org/irp/world/china/docs/iw_wei.htm (accessed 14 September 2011).
    • (1996) Liberation Army Daily
    • Jincheng, W.1
  • 35
    • 84867326088 scopus 로고
    • Computer Virus Infections: Is NSA Vulnerable?
    • Author's name redacted
    • [Author's name redacted], 'Computer Virus Infections: Is NSA Vulnerable?', Cryptologic Quarterly 4/Fall (1985) http://www.nsa.gov/public_info/_files/cryptologic_quarterly/com-putervirus.pdf.
    • (1985) Cryptologic Quarterly , vol.4
  • 36
    • 0004184890 scopus 로고
    • National Academy of Science, Computer Science and Telecommunications Board, (Washington: National Academy Press, (accessed 26 September 2011)
    • National Academy of Science, Computer Science and Telecommunications Board, 'Computers at Risk: Safe Computing in the Information Age' (Washington: National Academy Press 1991) http://www.nap.edu/openbook.php?record_id=1581&:page=7 (accessed 26 September 2011).
    • (1991) Computers At Risk: Safe Computing In the Information Age
  • 39
    • 84867326091 scopus 로고    scopus 로고
    • US Congress, General Accounting Office, Technical Report GAO/AIMD-96-84, 22 May, (accessed 26 September 2011)
    • US Congress, General Accounting Office, 'Information Security: Computer Attacks at Department of Defense Pose Increasing Risks', Technical Report GAO/AIMD-96-84, 22 May 1996 http://www.fas.org/irp/gao/aim96084.htm (accessed 26 September 2011)
    • (1996) Information Security: Computer Attacks At Department of Defense Pose Increasing Risks
  • 40
    • 3242850472 scopus 로고    scopus 로고
    • Office of the Under Secretary of Defense for Acquisition &c Technology, November, (accessed 26 September 2011)
    • Office of the Under Secretary of Defense for Acquisition &c Technology, 'Report of the Defense Science Board Task Force on Information Warfare-Defense (IW-D)', November 1996 http://cryptome.org/iwd.htm (accessed 26 September 2011).
    • (1996) Report of the Defense Science Board Task Force On Information Warfare-Defense (IW-D)
  • 41
    • 0003994024 scopus 로고    scopus 로고
    • President's Commission on Critical Infrastructure Protection, Final Report, October, (accessed 14 September 2011)
    • President's Commission on Critical Infrastructure Protection, Final Report, Critical Foundations: Protecting America's Infrastructures, October 1997, p.10 http://www.fas.org/sgp/library/pccip.pdf (accessed 14 September 2011).
    • (1997) Critical Foundations: Protecting America's Infrastructures , pp. 10
  • 42
    • 84867307264 scopus 로고    scopus 로고
    • Director, National Security Agency, testimony before the Senate Governmental Affairs Committee, 24 June, (accessed 26 September 2011)
    • Kenneth A. Minihan, Director, National Security Agency, 'Cyber Attack: Is Our Nation at Risk?', testimony before the Senate Governmental Affairs Committee, 24 June 1998 http://www.defense.gov/speeches/speech.aspx?speechid=704 (accessed 26 September 2011)
    • (1998) Cyber Attack: Is Our Nation At Risk?
    • Minihan, K.A.1
  • 43
    • 84867287385 scopus 로고    scopus 로고
    • Transcript of a press conference at the Pentagon held by, 16 April, (accessed 14 September 2011)
    • Transcript of a press conference at the Pentagon held by Kenneth H. Bacon, Assistant Secretary of Defense for Public Affairs, 16 April 1998 http://www.defense.gov/transcripts/transcript.aspx?transcriptid=793 (accessed 14 September 2011)
    • (1998) Assistant Secretary of Defense For Public Affairs
    • Bacon, K.H.1
  • 44
    • 84867321130 scopus 로고    scopus 로고
    • Eligible Receiver
    • See also, 16 April
    • See also Bill Gertz, 'Eligible Receiver', Washington Times, 16 April 1998 http://www.deaddrop.com/InfoSec/Papers/EligibleReceiver.html
    • (1998) Washington Times
    • Gertz, B.1
  • 47
    • 84867287386 scopus 로고    scopus 로고
    • Transcript of a press conference by
    • Transcript of a press conference by Kenneth H. Bacon, http://www.defense.gov/transcripts/transcript.aspx?transcriptid=793
    • Bacon, K.H.1
  • 48
    • 84867326092 scopus 로고    scopus 로고
    • Hackers Victimize CalTSO
    • 9 June
    • 'Hackers Victimize CalTSO', Los Angeles Times, 9 June 2001
    • (2001) Los Angeles Times
  • 49
    • 6244245533 scopus 로고    scopus 로고
    • Virtual Defense
    • James Adams, 'Virtual Defense', Foreign Affairs 80/3 (2001) p.99.
    • (2001) Foreign Affairs , vol.80 , Issue.3 , pp. 99
    • Adams, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.