How an Exploit in the Computer System of a Small Company Was Used to Gain Access to Two Major Govern

In this paper, I will describe how an exploit in the computer system of a small company was used to gain access to two major government agencies. First, I will introduce the players in this incident. I will summarize what was reported in a follow-up executive meeting. I will explain the exploit...
By Adrienne Zago-Swart
November 5, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg