Agenda for Misuse Detection Project Meeting
Tuesday 01-July-97, 1pm - 3pm

Review agenda. Select a timekeeper.
"Addressing the insider threat" (0:40) Scott Miller
    1993 paper by Hochberg, Jackson, et. al.

discuss formulating medical security policies (0:40) Chris & Steven
    employ David Day's model to design an audit plan

NT policy editor (0:10) Brant
    wrap-up. final report? what next?

Kathy's status on NT config (0:10) Kathy

Admin (0:05)
    Maria has received virus code and MTE. proceeding.
    Proceedings from Medical Records Institute not here yet. Chris checked.
    Accounts for our new students?

Topics for next agenda (0:05)
    Karl tell us about phone conversation with Susan

01-July-97 Meeting Notes, 1:10pm - 3:30pm

Attendees: Steven Templeton, Chris, Julie, Brant, Scott Miller, Matt Bishop Joe's Kitchen.

It looked like Brant had the best lunch, chow fun, dry.
shuffled Scott's talk til end, when we reconvened in the conf. room.

discuss formulating medical security policies (0:20) Chris & Steven
    employ David Day's model to design an audit plan
    Chris & Steven met with Financial aid and internal auditors to
    get access to real data and perhaps detect fraud. Some minor
    discussion about Chris' brain fart, not many had read it.

NT policy editor (0:10) Brant
    Brant will table it for now. Reviewed with Chris after the
    meeting.

"Addressing the insider threat" (0:40) Scott Miller
    1993 paper by Hochberg, Jackson, et. al.
    consensus that this is a good paper, well written and lots of good examples.
    Chris' played devil's advocate and said that most suggestions were impractical,
    so what is the use? Matt countered that they were goals to be aimed for, not
    necessarily achieved.