U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Run Circles Around Your Computer Security

NCJ Number
115883
Journal
Security Volume: 26 Issue: 2 Dated: (February 1989) Pages: 48-51
Author(s)
D C Elsbury
Date Published
1989
Length
4 pages
Annotation
Computer security, like other types, rests on two traditional security axioms: using perimeters to protect assets and making sure that basic protections are in force.
Abstract
The first circle of security uses traditional methods to protect against employee error and fraud. Computer security should be made a fundamental company value, accounting and auditing controls should be implemented, and programmer access should be limited. The second circle involves protecting the computer site through the use of higher level entry controls and adequate fire protection equipment. The third circle protects data stored in the computer system by using one-time-only passwords, computer dial-back devices, software access control, and audit control software. The final circle involves protecting transmitted data through message authentication techniques and encryption hardware. Tempest shields can provide added protection against electronic eavesdropping. In the event of a computer catastrophe, common-sense precautions should be taken to facilitate quick recovery of operations. These include installing a backup computer, storing data at a different site, and securing redundant networks to route data over alternate transmission lines.