U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Security (From Handbook of Loss Prevention and Crime Prevention, 2nd ed., P 498-520, 1989, Lawrence J. Fennelly, ed. -- See NCJ-115609)

NCJ Number
115610
Author(s)
J M Carroll; V Harold
Date Published
1989
Length
23 pages
Annotation
Because computers are vulnerable to crime, it is important for law enforcement personnel and organizations utilizing computers to increase their knowledge of what constitutes computer security.
Abstract
The chapter summarizes security approaches relating to hardware, software, and communications and identifies defense mechanisms for computer security, including physical security, personnel security, and the encryption of sensitive information. Organizations that use computers to manage and store sensitive information should identify a security coordinator and give that person responsibility for threat evaluation, security procedures, countermeasures, backup and recovery planning, intelligence, and security training. An appendix contains a computer security checklist.