U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Managing Computer Security: Methodology and Policy

NCJ Number
127987
Journal
Information Age Volume: 12 Issue: 4 Dated: (October 1990) Pages: 213-216
Author(s)
J H P Elorr; K P Badenhorst
Date Published
1990
Length
4 pages
Annotation
This paper discusses issues relevant to implementing a computer security policy, particularly through structured methodology.
Abstract
It presents a computer security (CS) methodology comprised of five clearly defined phases, arranged in predetermined chronological sequence: initiation; computer security policy; risk analysis and project definition; installation; and maintenance. Terminology issues, purpose of computer security, definition of scope of computer security, and accountability and responsibility are important considerations in development of CS policy. In addition, technological CS comprised of physical and logical security need to be addressed for protection of data and programs in the system and hardware resources of a computer system, respectively. Application computer security is also important for the development of applications or production of reliable software. The CS methodology provides a comprehensive management tool for implementation of computer security in any organization. 1 figure, 1 table, and 7 references

Downloads

No download available

Availability