In 1983, teenagers used computers in their homes to look at and modify data in computers thousands of miles away. Reports of these incidents, television dramas, and the movie "WarGames" have all aroused interest in the subject of how and how effectively computing systems' defenses withstand attacks by unauthorized individuals. The subject is of more than passing concern.
ACM SIGSAC Review – Association for Computing Machinery
Published: Jan 1, 1986