Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Lawrence E. Bassham; William T. Polk;|
|Title:||Threat Assessment of Malicious Code and External Attacks|
|Published:||October 01, 1992|
|Abstract:||As a participant in the U. S. Army Computer Vulnerability/Survivability Study Team, the National Institute of Standards and Technology has been tasked with providing an assessment of the threats associated with commercial hardware and software. This document is the second and final deliverable under the Military Interdepartmental Purchase Request number: W43P6Q-92-EW138. This report provides an assessment of the threats associated with malicious code and external attacks on systems using commercially available hardware and software. The history of the threat is provided and current protection methods described. A projection of the future threats for both malicious code and human threats is also given.|
|Citation:||NIST Interagency/Internal Report (NISTIR) - 4939|
|Research Areas:||Threats & Vulnerabilities, Information Technology, Computer Security|