11.8. NOTES

[]

[] Winn Schwartau, Information Warfare (New York: Thunder's Mouth Press, 1996): 683.

[]

[] "Student Breaks Encryption Code," KIRO Radio News Fax (January 30, 1997): 1.

[]

[] "Hackers Attack Department of Defense," Internal Auditor (October 1996): 10.

[]

[] "Hackers Stole Gulf War Secrets," KIRO Radio News Fax, (March 25, 1997): front page.

[]

[] Dr. Dorothy E. Denning, Manager's Guide to Cyberspace Attacks and Countermeasures (San Francisco: Computer Security Institute, 1997), 12–13.

[]

[] Laura Myers, "Hired Hackers Breach Nation's Computer System," Seattle Post-Intelligencer, April 17, 1998: A3.

[]

[] "Code That Safeguards Internet Transactions Broken," NewsEdge Corporation Newsbyte (August 30, 1999); Bruce Schneier, "The 1999 Crypto Year-in-Review," Information Security (December 1999): 23.

[]

[] "Lengthy Keys Are Easier to Detect," SC Magazine (May 1999): 17.

[]

[] Don Clark, "Group Cracks Financial-Data Encryption Code," Wall Street Journal (June 19, 1997): A3.

[]

[] From RSA's website: www.rsa.com (July 11, 1997).

[]

[] "RSA's Secret-Key Challenge Solved Again," Secure Computing (April 1998): 14.

[]

[] Tom Trusty, "Beware the Deep Crack Threat," Bank Fraud (Chicago: Bank Administration Institute, September 1998): 2; Bruce Schneier, "The 1998 Crypto Year-in- Review," Information Security (January 1999): 21.

[]

[] Denning, Manager's Guide to Cyperspace Attacks and Countermeasures, 12.

[]

[] In fact, Ian Goldberg did it in 3.5 hours, as mentioned at the beginning of this chapter. ...

Get Auditing Information Systems, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.