Elements of Computer Security Author: David Salomon Keywords: computer security, viruses, worms, security, network security, identity.
Interesting introduction to viruses, worms, etc. Enough technical detail to keep it interesting.
Possible ways to use topic maps in computer security:
- Treat the code in viruses, worms, etc. as subjects and use a topic map to document/discover commonalities.
- Identify weak code in applications/OSes as subjects and find occurrences in other parts of an application/OS.
- Create maps between and literature and applications/OSes.
- Create maps of viruses, worms, etc. to specific applications/OSes.
- Create maps of sites known to have particular weaknesses