U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Methodology for Evaluating and Selecting Desk Top Computer Security Products

NCJ Number
123888
Journal
Computer Security Journal Volume: 5 Issue: 2 Dated: (1990) Pages: 89-97
Author(s)
M H Brothers
Date Published
1990
Length
9 pages
Annotation
Desk top computers require special security considerations due to their proliferation, accessibility, and portability.
Abstract
This article presents a method for selecting the types of control measures needed to address these issues. It describes various categories of security products and provides a comparative analysis of the categories using a set of objectives and requirements. This process produces a point score for each category, which is then reviewed in light of the associated risks for that alternative. The results of the simplified analysis described here indicate that a combination of firmware-based access control and physical brackets provide the most effective security control for the average desk top computer...based on the specific objectives and requirements that were defined as a starting point. This approach can easily be extended to evaluate specific products within a category, and can also be applied to many other areas where security alternatives must be considered. Its quantitative, comparative nature makes it especially useful in documenting the decisionmaking process and justifying requests and recommendations to management. (Author abstract)