This article may help you with what you are looking for http://www.infosecuritymag.com/2003/mar/cover.shtml