Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Computer Attacks: What They Are and How to Defend Against Them

Published

Author(s)

Peter M. Mell

Abstract

Although a host of technologies exists to detect and prevent attacks against computers, a human must coordinate responding to a successful network penetration. At the same time, the majority of systems administrators are not prepared to handle a sophisticated attacker. NIST recognizes this problem and is focusing its efforts on enabling system administrators to respond to computer breaches. We focus our recent and future work on three major areas:* The Federal Computer Incident Response Capability (FedCIRC) Pilot,* A guide to create computer security incident response capabilities, and* Statistical sampling and categorization of known computer attacks.
Citation
ITL Bulletin -

Keywords

attacks, computer incident handling, computer incident response, computer incidents, computer security, FedCIRC, incident handling, incident response, statistics

Citation

Mell, P. (1999), Computer Attacks: What They Are and How to Defend Against Them, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=151188 (Accessed December 12, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created May 26, 1999, Updated May 4, 2021