Oral history interview with Daniel J. Edwards
2013-07-02
Loading...
View/Download File
Persistent link to this item
Statistics
View StatisticsJournal Title
Journal ISSN
Volume Title
Title
Oral history interview with Daniel J. Edwards
Authors
Published Date
2013-07-02
Publisher
Charles Babbage Institute
Type
Oral History
Abstract
In this oral history, computer security pioneer Daniel Edwards discusses his long-term career as a computer security researcher at the National Security Agency (NSA). He discusses Trojan Horse attacks, a term he introduced in the computer security field to describe a particular type of computer security vulnerability of hidden malicious code within a seemingly harmless program. He provides perspective on the evolving relationship of communications security (COMSEC) and computer security (COMPUSEC) at the NSA. Edwards became part of the NSA’s National Computer Security Center and was principally involved with the development of the NCSC’s/DOD’s Trusted Computer System Evaluation Criteria (TCSEC) and elaborates on the processes and considerations in developing and refining this influential set of computer security standards.
This material is based upon work supported by the National Science Foundation under
Grant No. 1116862, “Building an Infrastructure for Computer Security History.”
Description
Transcript, 51 pp.
Related to
Replaces
License
Collections
Series/Report Number
Funding information
This material is based upon work supported by the National Science Foundation under
Grant No. 1116862, “Building an Infrastructure for Computer Security History.”
Isbn identifier
Doi identifier
Previously Published Citation
Daniel J. Edwards, OH 427. Oral history interview by Jeffrey R. Yost, 2 July 2013, Roanoke, VA. Charles Babbage Institute, University of Minnesota, Minneapolis. http://hdl.handle.net/11299/162379
Other identifiers
OH 427
Suggested citation
Edwards, Daniel J.. (2013). Oral history interview with Daniel J. Edwards. Retrieved from the University Digital Conservancy, https://hdl.handle.net/11299/162379.
Content distributed via the University Digital Conservancy may be subject to additional license and use restrictions applied by the depositor. By using these files, users agree to the Terms of Use. Materials in the UDC may contain content that is disturbing and/or harmful. For more information, please see our statement on harmful content in digital repositories.