U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Networked for Crime

NCJ Number
134348
Journal
Security Management Volume: 35 Issue: 12 Dated: (December 1991) Pages: 26,28-29
Author(s)
D B Nickell
Date Published
1991
Length
3 pages
Annotation
Establishing that a networked personalized computer (PC) provides an ideal opportunity for crime, this article reviews the scope of vulnerability, identifies the covert and overt external threats as well as the internal personnel threat, and proposes some principal tools used in security solutions.
Abstract
Principal security tools to fight attacks on networked systems that are particularly vulnerable to theft or damage on the part of disinterested, dishonest, disgruntled, and disaffected employees include: physical security; identification and authentication which are provided by passwords and password tokens; discretionary control; mandatory access control; object reuse encryption which means encoding files into unintelligible gibberish; audit trails; a well-designed, well-implemented security administration program; and assurance to describe the multidimensional, multidisciplinary process by which a secure computing system is put together. Network managers and senior corporate officials cannot afford to remain ignorant of insider threat to personalized computers and networks.