Chapter 1
Chapter 1
1.2 History
1
outstation students. Another modern hostel and housing complex has been developed in sector-
70, Mohali that is a kilometer away from the institute.
C-DAC (Erstwhile CEDTI) Mohali, an institute under the Government of India, is the first
society of Ministry of Communications and Information Technology to have an ISO 9002
certification, which reflects the quality in conceptualization, design, implementation and
monitoring of the training programs. The certification is a testimony by international quality in
system that governs its well structured and regularity updated training with global acceptance.
1.3 Research
The technologies dealt with within the house of C-DAC are Natural language
processing (NLP), Artificial Intelligence (AI), e-Learning, Multilingual computing, Multimedia
computing,Geomatics, Cyber Security, Real Time Systems, Software & Industrial
automation, High Performance Computing, Data Warehousing/Data Mining, Digital/Broadband
Wireless networks, Modeling and Visualization etc. The sectors addressed are Finance,
Healthcare, Power, Steel, Defence, Telecom, Agriculture, Industrial Control, Broadcasting,
Education and e-Governance.
Graphics and Intelligence based scripting Technology: GIST is one of the Dynamic
Groups working in Multilingual Technologies.
System Area Network: HTDG is currently working on products based on the VI
Architecture specification. These include high-performance SAN interface cards and high-
speed, scalable switches for these SANs.
Reconfigurable Computing System: Reconfigurable Computing System Cards at C-DAC
Parallel Programming Environments
High Performance Communication Subsystems
High Performance Storage Systems
Computational Atmospheric Sciences
Computational Structural Mechanics
Computational Fluid Dynamics
Seismic Data Processing
2
Bioinformatics
TETRA
Basic Sciences
Evolutionary Computing
1.4 Achievements
The Centre offered the following advanced technical services to various industries in the region:
The job work was done for the following companies: BEL, Panchkula, DURO Electronics, Spice
Telecom, Mohali, Narmak System, Mohali, PUNCOM,Mohali, Ariens Electrotech, Souvenir
Graphics, Labotron Instruments, Rohini Micro Systems, Allenger Medical Systems, Mohali,
DELTRON, Chd, TELEBOX, Mohali, MONTECH Instruments, SCL, Mohali, CDIL, Chd.,
INDOSAW, Ambala, Multioverseas Pvt. Ltd., Saksham Electronics Chd., Multioverseas Pvt.
Ltd., Alpha Medical, Chd, SAA Power Eng Pvt Ltd, BCC Fuba (I) Ltd, Micromation (P) Ltd.
Total revenue of Rs.72235.40 was generated through these facilities and services.
3
C-DAC, Mohali is increasing its thrust in R&D and Consultancy and Market Orientation to
support the needs of the industry, users and entrepreneurs in many core competency areas of C-
DAC including :-
Health Informatics
Entrepreneurship Development
Hardware Technologies
Deployment of solutions in Government and various sectors
Formal Education & Non-Formal Education & Training Programs including VLSI,
Networking etc
4
CHAPTER 2
Ethical hacking will reveal the flaws of what is being hacked (software, a website, a network,
etc.) without actually causing any damage. An ethical hacker will find the flaw and report it to
the owner so that it can be fixed as soon as possible.
There are various benefits of ethical hacking. This article lists the benefits of this kind of
hacking.
1. To fight against terrorism:
There are many terrorists and terrorist organizations that are trying to create havoc in the world
with the use of computer technology. They break into various government defense systems and
then use this for their terrorist activities. This can be prevented by using the services of ethical
hackers who counter the terrorists by misleading them.
5
the powers of the hackers to get a proper system built helps to prevent penetration by the hackers
and saves the information in the various government networks.
2.2 Abstract
Today more and more softwares are developing and people are getting more and more options
in their present softwares. But many are not aware that they are being hacked without
their knowledge. One reaction to this state of affairs is a behavior termed “Ethical Hacking"
which attempts to pro-actively increase security protection by identifying and patching known
security vulnerabilities on systems owned by other parties.
A good ethical hacker should know the methodology chosen by the hacker like
reconnaissance, host or target scanning, gaining access, maintaining access and clearing
tracks. For ethical hacking we should know about the various tools and methods that can be used
by a black hat hacker apart from the methodology used by him.
From the point of view of the user one should know at least some of these because some
hackers make use of those who are not aware of the various hacking methods to hack into a
system. Also when thinking from the point of view of the developer, he also should be aware of
these since he should be able to close holes in his software even with the usage of the various
tools. With the advent of new tools the hackers may make new tactics. But at least the software
will be resistant to some of the tools.
2.3 Introduction
Ethical hacking also known as penetration testing or white-hat hacking, involves the
same tools, tricks, and techniques that hackers use, but with one major difference that Ethical
hacking is legal. Ethical hacking is performed with the target’s permission. The intent of ethical
hacking is to discover vulnerabilities from a hacker’s
viewpoint so systems can be better secured. It’s part of an overall information risk management
program that allows for ongoing security improvements. Ethical hacking can also ensure that
vendors’ claims about the security of their products are legitimate.
6
Understanding the Need to Hack Your Own Systems
To catch a thief, think like a thief. That’s the basis for ethical hacking. The law of averages
works against security. With the increased numbers and expanding knowledge of hackers
combined with the growing number of system vulnerabilities and other unknowns, the time will
come when all computer systems are hacked or compromised in some way. Protecting your
systems from the bad guys — and not just the generic vulnerabilities that everyone knows about
— is absolutely critical. When you know hacker tricks, you can see how vulnerable your
systems are. Hacking preys on weak security practices and undisclosed vulnerabilities. Firewalls,
encryption, and virtual private networks (VPNs) can create a false
feeling of safety. These security systems often focus on high-level vulnerabilities, such as viruses
and traffic through a firewall, without affecting how hackers work. Attacking your own systems
to discover vulnerabilities is a step to making them more secure. This is the only proven method
of greatly hardening your systems from attack. If you don’t identify weaknesses, it’s a matter of
time before the vulnerabilities are exploited. As hackers expand their knowledge, so should you.
You must think like them to protect your systems from them. You, as the ethical hacker, must
know activities hackers carry out and how to stop their efforts. You should know what to look
for and how to use that information to thwart hackers’ efforts. You don’t have to protect your
systems from everything. You can’t. The only protection against everything is to unplug your
computer systems and lock them away so no one can touch them — not even you. That’s not the
best approach to information security. What’s important is to protect your systems from known
vulnerabilities and common hacker attacks.
It’s impossible to buttress all possible vulnerabilities on all your systems. You can’t plan for all
possible attacks — especially the ones that are currently unknown. However, the more
combinations you try — the more you test whole systems instead of individual units — the better
your chances of discovering vulnerabilities that affect everything as a whole.
Don’t take ethical hacking too far, though. It makes little sense to harden your systems from
unlikely attacks. For instance, if you don’t have a lot of foot trafficin your office and no internal
Web server running, you may not have as much to worry about as an Internet hosting provider
would have. However, don’t forget about insider threats from malicious employees!
7
Your overall goals as an ethical hacker should be as follows:
Hack your systems in a nondestructive fashion.
Enumerate vulnerabilities and, if necessary, prove to upper management that
vulnerabilities exist.
Apply results to remove vulnerabilities and better secure your systems.
2.4 History
In one early ethical hack, the United States Air Force conducted a “security evaluation” of the
Multics operating systems for “potential use as a two-level (secret/top secret) system.” With the
growth of computer networking, and of the Internet in particular, computer and network
vulnerability studies began to appear outside of the military establishment. Most notable of these
was the work by Farmer and Venema, which was originally posted to Usenet in December of
1993.
8
● Loss of reputation of a company
CHAPTER 3
METHODOLOGY
3.1 Hacking
Eric Raymond, compiler of “The New Hacker's Dictionary”, defines a hacker as a clever
programmer. A "good hack" is a clever solution to a programming problem and "hacking" is
the act of doing it.
Raymond lists five possible characteristics that qualify one as a hacker, which we paraphrase
here:
● A person who enjoys learning details of a programming language or system
● A person who enjoys actually doing the programming rather than just theorizing
about it
● A person capable of appreciating someone else's hacking
● A person who picks up programming quickly
● A person who is an expert at a particular programming language or system
Types of Hackers:
Hackers can be broadly classified on the basis of why they are hacking system or why the are
indulging hacking. There are mainly three types of hacker on this basis
Black-Hat Hacker
A black hat hackers or crackers are individuals with extraordinary computing skills,
resorting to malicious or destructive activities. That is black hat hackers use their knowledge
and skill for their own personal gains probably by hurting others.
White-Hat Hacker
White hat hackers are those individuals professing hacker skills and using them for defensive
purposes. This means that the white hat hackers use their knowledge and skill for the good of
others and for the common good.
9
Grey-Hat Hackers
These are individuals who work both offensively and defensively at various times. We cannot
predict their behaviour. Sometimes they use their skills for the common good while in some
other times he uses them for their personal gains.
Social
Engineering
Automated
Organizational Attacks
Attacks
Restricted
Data
Accidental Breaches
in Security
Denial of
Viruses, Trojan Horses, Service (DoS)
and Worms
10
3.3 What do an Ethical Hacker do?
An ethical hacker is a person doing ethical hacking that is he is a security personal who tries
to penetrate in to a network to find if there is some vulnerability in the system. An ethical hacker
will always have the permission to enter into the target network. An ethical hacker will first think
with a mindset of a hacker who tries to get in to the system.
He will first find out what an intruder can see or what others can see. Finding these an ethical
hacker will try to get into the system with that information in whatever method he can. If he
succeeds in penetrating into the system then he will report to the company with a detailed
report about the particular vulnerability exploiting which he got in to the system. He may
also sometimes make patches for that particular vulnerability or he may suggest some
methods to prevent the vulnerability.
11
● Scanning & Enumeration
● Gaining access
● Maintaining access
● Clearing tracks
Reconnaissance:
The literal meaning of the word reconnaissance means a preliminary survey to gain information.
This is also known as foot-printing. This is the first stage in the methodology of hacking. As
given in the analogy, this is the stage in which the hacker collects information about the
company which the personal is going to hack. This is one of the pre-attacking phases.
Reconnaissance refers to the preparatory phase where an attacker learns about all of the possible
attack vectors that can be used in their plan.
Enumeration:
Enumeration is the ability of a hacker to convince some servers to give them information that is
vital to them to make an attack. By doing this the hacker aims to find what resources and shares
can be found in the system, what valid user account and user groups are there in the network,
what applications will be there etc. Hackers may use this also to find other hosts in the entire
network.
12
Gaining access:
This is the actual hacking phase in which the hacker gains access to the system. The
hacker will make use of all the information he collected in the pre-attacking phases. Usually
the main hindrance to gaining access to a system is the passwords. System hacking can be
considered as many steps. First the hacker will try to get in to the system. Once he get in to the
system the next thing he want will be to increase his privileges so that he can have more control
over the system. As a normal user the hacker may not be able to see the confidential details or
cannot upload or run the different hack tools for his own personal interest. Another way to crack
in to a system is by the attacks like man in the middle attack.
· Password Cracking:
There are many methods for cracking the password and then get in to the system. The
simplest method is to guess the password. But this is a tedious work. But in order to make
this work easier there are many automated tools for password guessing like legion.
Legion actually has an inbuilt dictionary in it and the software will automatically. That is
the software itself generates the password using the dictionary and will check the
responses.
Techniques used in password cracking are:
· Dictionary cracking
· Brute force cracking
· Hybrid cracking
· Social engineering
· Privilege escalation:
Privilege escalation is the process of raising the privileges once the hacker gets in to the
system. That is the hacker may get in as an ordinary user. And now he tries to increase his
privileges to that of an administrator who can do many things. There are many types of tools
available for this. There are some tools like getadmin attaches the user to some kernel routine
so that the services run by the user look like a system routine rather than user initiated
13
program. The privilege escalation process usually uses the vulnerabilities present in the host
operating system or the software. There are many tools like hk.exe, metasploit etc. One
such community of hackers is the metasploit.
Maintaining Access:
Now the hacker is inside the system by some means by password guessing or exploiting some of
it’s vulnerabilities. This means that he is now in a position to upload some files and download
some of them. The next aim will be to make an easier path to get in when he comes the next
time. This is analogous to making a small hidden door in the building so that he can directly
enter in to the building through the door easily. In the network scenario the hacker will
do it by uploading some softwares like Trojan horses, sniffers , key stroke loggers etc.
Clearing Tracks :
Now we come to the final step in the hacking. There is a saying that “everybody
knows a good hacker but nobody knows a great hacker”. This means that a good hacker can
always clear tracks or any record that they may be present in the network to prove that he was
here. Whenever a hacker downloads some file or installs some software, its log will be stored
in the server logs. So in order to erase those the hacker uses man tools. One such tool is
windows resource kit’s auditpol.exe. This is a command line tool with which the intruder can
easily disable auditing. Another tool which eliminates any physical evidence is the evidence
eliminator. Sometimes apart from the server logs some other in formations may be stored
temporarily. The Evidence Eliminator deletes all such evidences.
14
· Wireshark
Features of wireshark
15
Wireshark is software that "understands" the structure of different networking protocols. Thus, it
is able to display the encapsulation and the fields along with their meanings of different packets
specified by different networking protocols. Wireshark uses pcap to capture packets, so it can
only capture the packets on the types of networks that pcap supports.
Data can be captured "from the wire" from a live network connection or read from a file
that recorded already-captured packets.
Live data can be read from a number of types of network, including Ethernet, IEEE
802.11, PPP, and loopback.
Captured network data can be browsed via a GUI, or via the terminal (command line)
version of the utility, tshark.
Captured files can be programmatically edited or converted via command-line switches
to the "editcap" program.
Data display can be refined using a display filter.
Plug-ins can be created for dissecting new protocols.
VoIP calls in the captured traffic can be detected. If encoded in a compatible encoding,
the media flow can even be played.
Raw USB traffic can be captured with Wireshark.This feature is currently available only
under Linux.
Wireshark's native network trace file format is the libpcap format supported by libpcap and
WinPcap, so it can read capture files from applications such as tcpdump and CA NetMasterthat
use that format, and its captures can be read by applications that use libpcap or WinPcap to read
capture files. It can also read captures from other network analyzers, such assnoop, Network
General's Sniffer, and Microsoft Network Monitor.
· Samspade:
Samspade is a simple tool which provides us information about a particular host. This tool
is very much helpful in finding the addresses, phone numbers etc
16
The above fig 2.1 represents the GUI of the samspade tool. In the text field in the top left
corner of the window we just need to put the address of the particular host. Then we can find
out various information available. The information given may be phone numbers, contact
names, IP addresses, email ids, address range etc. We may think that what is the benefit of
getting the phone numbers, email ids, addresses etc.
But one of the best ways to get information about a company is to just pick up the phone and
ask the details. Thus we can get much information in just one click.
· Email Tracker and Visual Route:
We often used to receive many spam messages in our mail box. We don’t know where it
comes from. Email tracker is a software which helps us to find from which server does the
mail actually came from. Every message we receive will have a header associated with it.
The email tracker uses this header information for find the location.
17
The above fig 2.2 shows the GUI of the email tracker software. One of the options in the
email tracker is to import the mail header. In this software we just need to import the mails
header to it. Then the software finds from which area that mail comes from. That is we will
get information like from which region does the message come from like Asia pacific,
Europe etc. To be more specific we can use another tool visual route to pinpoint the actual
location of the server. The option of connecting to visual route is available in the email
tracker. Visual route is a tool which displays the location a particular server with the help of
IP addresses. When we connect this with the email tracker we can find the server which
actually sends the mail. We can use this for finding the location of servers of targets also
visually in a map
18
The above fig 2.3 depicts the GUI of the visual route tool. The visual route GUI have a
world map drawn to it. The software will locate the position of the server in that world map.
It will also depict the path though which the message came to our system. This software
will actually provide us with information about the routers through which the message or
the path traced by the mail from the source to the Destination..
HoneyBOT
What is a Honeypot?
19
Honeypots are becoming one of the leading security tools used to monitor the latest tricks and
exploits of hackers by recording their every move so that the security community can more
quickly respond to new exploits.
How it Works
HoneyBOT works by opening over 1000 udp and tcp listening sockets on your computer and
these sockets are designed to mimic vulnerable services. When an attacker connects to these
services they are fooled into thinking they are attacking a real server. The honeypot safely
captures all communications with the attacker and logs these results for future analysis. Should
an attacker attempt an exploit or upload a rootkit or trojan to the server the honeypot
environment will safely store these files on your computer for analysis and submission
toantivirus vendors. Our test server has captured several thousand trojans and rootkits from these
simulated services including:
o Dabber
o Devil
o Kuang
o MyDoom
o Netbus
o Sasser
o LSASS
o DCOM (msblast, etc)
o Lithium
o Sub7
20
HoneyBOT Installation
We suggest that you install HoneyBOT on a dedicated computer with no valuable information or
resources required of it. In fact, you want your honeypot to be as free as possible from any
legitimate traffic so in broad terms we can consider any traffic to the honeypot to be malicious in
nature.
HoneyBOT requires minimum operating system of Windows 2000 and at least 128MB RAM is
recommended.
21
CHAPTER 4
ANALYSIS AND FINDINGS
4.1 Ethics
Moral values combine three decision attributes: ethical, social, and legal. Each of these attributes
is distinct but interdependent.
The term ethics refers to a sense of honesty and dishonesty. These are individual values; actions
that are ethical to one person may be unethical to another. Ethical actions are situation
dependent. Scanning a network or capturing packets may be considered ethical in one situation
but undesirable in another. Groups of people with similar ethics develop a moral code. Peer
groups and organizations may have social values that determine appropriate behavior.
Acceptable social values may vary between groups, regions, and cultures. For example, colleges
may teach students how to write computer viruses and analyze malware. Although writing
viruses is an acceptable behavior within this forum, there is no consensus among the wider group
of Internet users, and some security experts consider it to be an unacceptable practice
[Hulme2003].
Legal restrictions are developed for one of three purposes. If there is no consensus for social
values, then laws can be created to provide interpretation. Laws can also be used to specify
consequences for unacceptable behavior. For example, digital trespassing is a felony in the
United States with a punishment ranging from a fine to incarceration. Finally, laws can be used
to impose a minority opinion or competitive edge.
Although they are closely related, there is a distinction between ethical, social, and legal values.
Not every unethical action is illegal, and not every legal action is socially acceptable. Each is
dependent on the situation. By understanding the ethical, social, and legal implications, decisions
can be made that mitigate conflict or undesirable consequences.
In most countries, there is no limitation on what a user can place on his home computer. Just
because the software exists, however, does not mean that it should be used. As an example, Web
filters are commonly used to restrict network access. Parents may use them to prevent a child
from accessing adult-content Web sites. But filters can also track network access. Using a filter
to spy on a spouse’s network activities can be an invasion of privacy. Even though it is the same
technology, it can be used in acceptable and unacceptable ways.
22
To elaborate on this example, China has a long history of filtering network access. Although this
is the same type of technology used to block a child’s access to pornographic Web sites, it is
applied to a much larger scale. Many countries outside of China have called this censorship an
unacceptable practice; this is a difference in social values. An action considered socially
unacceptable to some members of the international community appears acceptable to the Chinese
government.
23
The line between right and wrong, acceptable and unacceptable is not always clear. And doing
what seems like the right thing may still have undesirable results.
Moral Framework
A moral framework forms the basis of ethical decision making. By understanding the ethical,
social, and legal implications, decisions can be made that reflect positive moral values. Steps can
be taken to develop a moral framework [Markkula2006]:
Recognize ethical issues: Problems cannot be addressed until they are first identified. Being
able to identify situations with potential ethical, social, and legal implications is critical to
making moral decisions.
Gather information: What facts are necessary to create an informed decision? A single decision
may impact many different people. Who is likely to be impacted by a decision and how will they
be affected? Are there known ramifications or responses to particular actions? Not all
information may be present.
What information is known to be unavailable?
Test hypothetical decisions: Determine a good solution for the problem and evaluate it for
ethical, social, and legal implications. Consider reviewing the decision with peers or trusted
colleagues—other people usually offer different opinions and valuable insights. Also consider a
wider impact: if the decision were made public, how would the public react?
Implement and reflect: Act on the decision and evaluate the reaction. Did it turn out as
expected, or did unidentified issues develop? Given the same circumstances, would the same
decisions be made or would the situation be handled differently? Reflection on past decisions is
an ongoing process. Some actions may take years for all of the repercussions to be identified.
Knowing how to react to a moral decision, before needing to make a decision, is a critical skill
that takes effort and practice. Without this skill, unethical behavior is likely to be repeated.
24
4.2 Advantages and disadvantages:
Ethical hacking nowadays is the backbone of network security. Each day its relevance is
increasing,the major pros & cons of ethical hacking are given below:
Advantages
· “To catch a thief you have to think like a thief”
· Helps in closing the open holes in the system network
· Provides security to banking and financial establishments
· Prevents website defacements
· An evolving technique
Disadvantages
· All depends upon the trustworthiness of the ethical hacker
· Hiring professionals is expensive.
Future enhancements:
25
CHAPTER 5
SUGGESTIONS AND RECOMMENDATIONS
5.2 Conclusion
One of the main aims of the seminar is to make others understand that there are so many tools
through which a hacker can get in to a system. Let’s check its various needs from various
perspectives.
● Student
A student should understand that no software is made with zero
Vulnerabilities. So while they are studying they should study the various possibilities and should
study how to prevent that because they are the professionals of tomorrow.
● Professionals
26
Professionals should understand that business is directly related to
Security. So they should make new software with vulnerabilities as less as possible. If they are
not aware of these then they won’t be cautious enough in security matters.
In the preceding sections we saw the methodology of hacking, why should we aware of hacking
and some tools which a hacker may use. Now we can see what we can do against hacking or to
protect ourselves from hacking.
● The first thing we should do is to keep ourselves updated about those softwares
we and using for official and reliable sources.
● Educate the employees and the users against black hat hacking.
● Use every possible security measures like Honey pots, Intrusion Detection Systems, Firewalls
etc.
● every time make our password strong by making it harder and longer to be cracked.
27
Bibliography
1. E. S. Raymond, The New Hacker’s Dictionary, MIT Press, Cambridge, MA (1991).
2. S. Garfinkel, Database Nation, O’Reilly & Associates, Cambridge, MA (2000).
3. The first use of the term “ethical hackers” appears to have been in an interview with John
Patrick of IBM by Gary Anthens that appeared in a June 1995 issue of ComputerWorld.
4. P. A. Karger and R. R. Schell, Multics Security Evaluation: ulnerability Analysis, ESD-TR-
74-193, Vol. II, Headquarters Electronic Systems Division, Hanscom Air Force Base, MA (June
1974).
5. S. M. Goheen and R. S. Fiske, OS/360 Computer Security Penetration Exercise, WP-4467,
The MITRE Corporation, Bedford,
MA (October 16, 1972).
6. R. P. Abbott, J. S. Chen, J. E. Donnelly, W. L. Konigsford, and S. T. Tokubo, Security
Analysis and Enhancements of Computer
Operating Systems, NBSIR 76-1041, National Bureau of Standards, Washington, DC (April
1976).
7. W. M. Inglis, Security Problems in the WWMCCS GCOS System, Joint Technical Support
Activity Operating System Technical
Bulletin 730S-12, Defense Communications Agency (August 2, 1973).
8. D. Farmer andW.Z. Venema, “Improving the Security of Your Site by Breaking into It,”
originally posted to Usenet (December
1993); it has since been updated and is now available at
ftp://ftp.porcupine.org/pub/security/index.html#documents.
9. See http://www.faqs.org/usenet/.
10. Who can really determine who said something first on theInternet?
11. See http://www.cs.ruu.nl/cert-uu/satan.html.
12. This strategy is based on the ideal of raising the security of the whole Internet by giving
security software away. Thus, no one will have any excuse not to take action to improve security.
13. S. Garfinkel and E. Spafford, Practical Unix Security, First Edition, O’Reilly & Associates,
Cambridge, MA (1996).
28
14. For a collection of previously hacked Web sites, see http:// www.2600.com/hacked_pages/ or
http://defaced.alldes.de. Be forewarned, however, that some of the hacked pages may contain
pornographic images.
15. In 1965, Intel cofounder Gordon Moore was preparing a speech and made a memorable
observation. When he started to graph data about the growth in memory chip performance, he
realized there was a striking trend. Each new chip contained roughly twice as much capacity as
its predecessor, and each chip was released within 18–24 months of the previous chip. In
subsequent years, the pace slowed down a bit, but
data density has doubled approximately every 18 months, and this is the current definition of
Moore’s Law.
16. J. O. Kephart, G. B. Sorkin, D. M. Chess, and S. R. White, “Fighting Computer Viruses,”
Scientific American 277, No. 5, 88–93 (November 1997).
17. See http://www.research.ibm.com/antivirus/SciPapers.htm for additional antivirus research
papers.
18. A. Boulanger, “Catapults and Grappling Hooks: The Tools and Techniques of Information
Warfare,” IBM Systems Journal 37, No. 1, 106–114 (1998).
19. R. R. Schell, P. J. Downey, and G. J. Popek, Preliminary Notes on the Design of Secure
Military Computer Systems, MCI-73-1,
ESD/AFSC, Hanscom Air Force Base, Bedford, MA (January 1973).
29