First Computer Security Threat Model
This paper outlines the configuration of a typical remote-access, multi-user, resource-sharing computer system and identifies some of its vulnerabilities to unauthorized sources. In military terms, this is the computer security problem, and in civilian terms, it’s a computer privacy problem. There are vulnerabilities of personnel, hardware, software and communications. Eavesdropping, wiretapping, copying or outright theft of files are possible. Could reasons of national interest lead the professional intelligence effort of a foreign government to focus on a computer network?
Read more
HERE
to find out.