Dorothy Denning

Dorothy Denning
Dorothy Elizabeth Denningis an American information security researcher who is a graduate of the University of Michigan. She has published four books and 140 articles. At Georgetown University, she was the Patricia and Patrick Callahan Family Professor of computer science and director of the Georgetown Institute of Information Assurance. She is now a professor in the Department of Defense Analysis at the Naval Postgraduate School...
attack code computer install potential red worms zombies
Computer worms like Code Red can be used to find potential zombies and automatically install the attack software.
capability cause damage degree lack motivated seem terrorists violence
Conversely, terrorists who are motivated to cause violence seem to lack the capability to cause that degree of damage in cyberspace.
attacks climate computer cyber emerged growing network protests serious
Cyber protests have emerged in a climate where computer network attacks have become a serious and growing threat.
advanced command control denial launch massive service tools
The tools used to launch massive denial of service assaults, for example, have advanced command and control capabilities.
open systems ways
New vulnerabilities are continually uncovered, and systems are configured or used in ways that make them open to attack.
companies experience key offering provide recovery services
Some companies are offering to provide key recovery services now, but we don't have any experience with such services. That's part of the problem.
access believe conditions controlled far government legitimate privacy protect records stored tightly valuable
With those people, I'm very far apart, because I believe that government access to communications and stored records is valuable when done under tightly controlled conditions which protect legitimate privacy interests.
absolute access agencies court electronic gain government privacy records
We have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders.
interest key respect stored
I think most organizations have an interest in key recovery, at least with respect to stored data.
leaving market prefer
I prefer leaving things to the market as much as possible.
good leaving market
However, leaving everything to the market is not necessarily good for society.
base carefully data decisions hard options particular
I don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the options and all their ramifications in making our decisions.
address capability encourage favor include industry key recovery sort strategies systems user
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.
achieving attack damage desired harder level physical systems using
Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons.