U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Network Security: Safeguarding Systems Against the Latest Threats

NCJ Number
199065
Journal
Police Chief Volume: 50 Issue: 2 Dated: February 2003 Pages: 23-31
Author(s)
Eric Moore
Date Published
February 2003
Length
9 pages
Annotation
This article discusses safeguards against computer crime in law enforcement agencies.
Abstract
Security breaches of computers, such as viruses and Web site defacements, have reached epidemic proportions. In addition to confidential data that law enforcement agencies must safeguard, police departments and law enforcement agencies have the added responsibility of presenting a secure image to the public. Another concern is that those that want to rebel against authority have traditionally targeted police. For these reasons, law enforcement must increasingly assess and plan the protection and security of its networked systems. Network security is the protection of networks, their services, and their connections from unauthorized access, modification, destruction, or disclosure. The primary goal is the prevention of unauthorized entry to the system. This includes the limiting of damage from attacks that may occur, and ensuring system capabilities in spite of compromises or failures. A variety of methods must be employed to protect the security infrastructure of systems and critical data. These methods include a combination of awareness by users, effective security technologies, and implementation of practical system security procedures. Primary points to consider are the value of the assets that must be protected, consequences of loss of confidentiality or operational capability, vulnerabilities that could bring about a loss, existing threats that could exploit vulnerabilities, likelihood that a threat might occur, and availability and appropriateness of options and resources to address risk. Firewall protection allows access control and is now ranked as the most popular applied method of security technology. Antivirus software, intrusion detection, and encryption are other methods of security. Some guidelines for network security are using the latest technologies to protect the network; using strong passwords; responding to breaches of security in a timely manner; and regularly backing up the system. The Regional Information Sharing System (RISS) intelligence network exemplifies government computer security best practices by enabling the sharing of law enforcement information among thousands of professionals across the United States. 19 notes