22 April 1999


Date: Wed, 21 Apr 1999 08:45:28 -0400
From: denning@cs.georgetown.edu (Dorothy Denning)
Subject: (ai) Simulating Cyber Attacks, Defenses, and Consequences
Sender: <access@g2-forward.org>

From Risks Digest 20.32, April 20, 1999

Date: Tue, 20 Apr 1999 10:33:14 -0700 (PDT)
From: Fred Cohen <fc@all.net>
Subject: New paper on Simulating Cyber Attacks, Defenses, and Consequences

This morning, I posted a new paper to the all.net Web site that I think you
might be very interested in.  It will soon appear in print as an invited
paper in "Computers and Security", it will be briefly covered in one of my
short presentations at the IEEE Oakland conference, and it will be given in
its entirety at the upcoming CSI conference.  The paper is titled:

	"Simulating Cyber Attacks, Defenses, and Consequences"

and it can be found at the all.net web site under:

	Feature Articles: InfoSec Baseline Studies

I think that this is one of the most interesting papers I have written in
the last two years, and I ask that those of you who are interested in such
things take the time to read and comment on it.  I thank you for your time.

FC 
  Fred Cohen & Associates: http://all.net - fc@all.net - tel/fax:925-454-0171



NOTE: In accordance with Title 17 <U.S.C.> Section 107, this material is
distributed without profit or payment to those who have expressed a
prior interest in receiving this information for non-profit research and
educational purposes only. Provided by G2-Forward.