Oral history interview with Daniel J. Edwards

Loading...
Thumbnail Image

View/Download File

Persistent link to this item

Statistics
View Statistics

Journal Title

Journal ISSN

Volume Title

Title

Oral history interview with Daniel J. Edwards

Published Date

2013-07-02

Publisher

Charles Babbage Institute

Type

Oral History

Abstract

In this oral history, computer security pioneer Daniel Edwards discusses his long-term career as a computer security researcher at the National Security Agency (NSA). He discusses Trojan Horse attacks, a term he introduced in the computer security field to describe a particular type of computer security vulnerability of hidden malicious code within a seemingly harmless program. He provides perspective on the evolving relationship of communications security (COMSEC) and computer security (COMPUSEC) at the NSA. Edwards became part of the NSA’s National Computer Security Center and was principally involved with the development of the NCSC’s/DOD’s Trusted Computer System Evaluation Criteria (TCSEC) and elaborates on the processes and considerations in developing and refining this influential set of computer security standards. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Description

Transcript, 51 pp.

Related to

Replaces

License

Series/Report Number

Funding information

This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”

Isbn identifier

Doi identifier

Previously Published Citation

Daniel J. Edwards, OH 427. Oral history interview by Jeffrey R. Yost, 2 July 2013, Roanoke, VA. Charles Babbage Institute, University of Minnesota, Minneapolis. http://hdl.handle.net/11299/162379

Suggested citation

Edwards, Daniel J.. (2013). Oral history interview with Daniel J. Edwards. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/162379.

Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.