Jump to content

Security and Privacy in Computer Systems

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Wbm1058 (talk | contribs) at 19:22, 26 December 2020 (added Category:Computer security using HotCat). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Security and Privacy in Computer Systems is a paper by Willis Ware that was first presented to the public at the 1967 Spring Joint Computer Conference.[1][2]

Significance

Ware's presentation was the first public conference session about information security and privacy in respect of computer systems, especially networked or remotely-accessed ones.[3][4][5][6]

The IEEE Annals of the History of Computing said that Ware's 1967 Spring Joint Computer Conference session, together with 1970's Ware report, marked the start of the field of computer security.[7][8]

References

  1. ^ Kaplan, Fred (2020-12-18). "A Hack Foretold". Slate. Retrieved 2020-12-18. In April 1967, just before the ARPANET's rollout, an engineer named Willis Ware wrote a paper called 'Security and Privacy in Computer Systems' ... warning that once users could access data from multiple locations, people with certain skills could hack into a network—and after hacking into one part of the network, they could roam at will. Stephen Lukasik, ARPANET's supervisor, took Ware's paper to his team and asked what they thought. The team was annoyed. They begged Lukasik not to saddle them with a security requirement. ... Let's do this step by step, the team said. It had been hard enough to get the system to work; the Russians wouldn't be able to match it for decades. It did take decades—about three decades—for the Russians, then the Chinese and others, to develop their own systems along with the technology to hack America. Meanwhile, vast systems and networks would sprout up throughout the U.S. and much of the world, without any provisions for security. Some provisions would be backfitted later, but the vulnerability that Ware and the later studies observed was built into the technology. That's the root of the problem we're seeing today.
  2. ^ "AFIPS Spring Joint Computing Conference 1967: Atlantic City, NJ, USA". DBLP.
  3. ^ Carpenter-Huffman, P.; Rapp, Marjorie L. (1972). Testing in innovative systems. RAND Corporation. Ware organized the first session on data privacy/security ever held at a computer conference - "Security and Privacy in Computer Systems" at the 1967 Spring Joint Computer Conference (SJCC), April 1967.
  4. ^ Turn, R.; Ware, W. H. (July 1976). Privacy and security issues in information systems (PDF). RAND Corporation. The first apprehension with computer security began In the 1950s with concern over degaussing of magnetic tapes and preventing dissemination of classified information via electromagnetic emanations. By the mid—1960s time—sharing and multiprogramming allowed computer systems to serve many users simultaneously, and on-line programming, job execution, and data file manipulations could be performed from remotely located terminals. In such systems, as first discussed at the 1967 Spring Joint Computer Conference, security problems are different; there are many vulnerabilities which can be exploited by maliciously motivated users or by intruders from outside the system to perpetrate a variety of threats.
  5. ^ "Computer Security". Rutgers Journal of Computers and the Law. 5: 221. 1975. The earliest concerns arose in connection with computer applications in the military, where large databases and remote access to central computing files first emerged. With good reason, much of the information on how to make military systems secure remains classified. Such expertise was first brought to civilians during the 1967 Spring Joint Computer Conference.
  6. ^ Ware, Willis H. (2008). RAND and the information evolution : a history in essays and vignettes (PDF). RAND Corporation. ISBN 978-0-8330-4513-3. From this milieu, the topic of computer security—later to be called information-system security and currently also referred to as protection of the national information infrastructure—moved from the world of classified defense interests into public view for the first time. A few people—Bob Patrick, Pat Haverty, and Willis Ware among others—all then at the RAND Corporation ... had, in the late 1950s and early 1960s, been talking about the growing dependence of the country and its institutions on computer technology. It concerned them that the installed systems might not be able to protect themselves and their data against intrusive and destructive attacks. While there had been a few papers at the conferences on social effects of burgeoning computer technology, they decided that it was time to more directly bring the security aspect of computer systems to the attention of the technology and user communities. A fortuitous enabling event was the development within the National Security Agency (NSA) of a remote-access time-sharing system with a full set of security-access controls, running on a UNIVAC 494 machine, and serving terminals and users not only within the headquarters building at Fort George G. Meade, Maryland, but also worldwide. Willis Ware knew of the existence and details of the system. It proved possible to have a paper about the NSA system presented in a public forum, and, with two others from RAND to help—Harold Petersen and Rein Turn—plus Bernard Peters of NSA, a group of papers was organized and offered to the SJCC conference management as a ready-made additional paper session to be chaired by Ware. The conference accepted the offer, and the session was presented at the Atlantic City (N.J.) Convention Hall in 1967.
  7. ^ Misa, Thomas J. (October–December 2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals of the History of Computing. 38 (4). IEEE Computer Society: 12–25. doi:10.1109/MAHC.2016.48. ISSN 1058-6180. S2CID 17609542. The 1967 Spring Joint Computer Conference session organized by Willis Ware and the 1970 Ware Report are widely held by computer security practitioners and historians to have defined the field's origin.{{cite journal}}: CS1 maint: date format (link)
  8. ^ Yost, Jeffrey R. (October–December 2016). "Computer Security, Part 2" (PDF). IEEE Annals of the History of Computing. 38 (4). IEEE Computer Society: 10–11. doi:10.1353/ahc.2016.0040. S2CID 35453662. The 1970 (Willis H.) Ware Report and the 1967 Spring Joint Computer Conference (SJCC) Ware-led 'Computer Security and Privacy' session are focal points of historians and computer security scientists and are generally considered the beginning of multilevel computer security.{{cite journal}}: CS1 maint: date format (link)