Abstract
Information security vulnerabilities and threats are alive and well today, but this is nothing new. Attacks on data and telecommunications infrastructures have been going on since the development of those infrastructures, and the attacks adapt to the changing technology. This paper is a personal reminiscence of how the attack vectors have changed during the career of the author, but the types of attacks remain eerily similar.
Original language | American English |
---|---|
Journal | Computer |
Volume | 45 |
State | Published - Feb 2012 |
Externally published | Yes |
Keywords
- information security
Disciplines
- Other Computer Sciences