U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

DATA PROCESSING SECURITY GAME - SAFEGUARDING AGAINST THE REAL DANGERS OF COMPUTER ABUSE

NCJ Number
44258
Author(s)
R S BECKER
Date Published
1977
Length
111 pages
Annotation
RECOMMENDATIONS FOR MAINTAINING THE INTEGRITY OF A DATA PROCESSING SYSTEM IN A BUSINESS OR INSTITUTIONAL SETTING, AS WELL AS UNDERLYING PHILOSOPHIES, CONTROL PROCEDURES, AND CHECKLISTS, ARE PRESENTED.
Abstract
THE FIVE MAJOR AREAS OF CONCERN -- PHYSICAL ASPECTS, MAGNETIC MEDIA CONTROL, TERMINAL SYSTEMS, DATA SET CONTROL, AND DISASTER RECOVERY -- ARE EXPLORED IN RELATION TO COMPUTER CONFIDENTIALITY, LARCENY, PRIVACY, CIVIL AND CRIMINAL LIABILITY, AND ASSETS PROTECTION. SELECTIVE PROTECTION AND COMPARTMENTATION ARE DISCUSSED IN DETAIL AS EFFECTIVE PROCEDURES ALTERNATIVES TO THE SEARCH FOR TOTAL PROTECTION. BASIC ELEMENTS WHICH CAN AND SHOULD BE USED BY ALL INSTALLATIONS, REGARDLESS OF SIZE, SCOPE, OR MISSION, ARE SET FORTH. THE TEXT IS DESIGNED FOR CORPORATE EXECUTIVES, DATA PROCESSING PROFESSIONALS, AND COLLEGE STUDENTS. APPENDIXES PRESENT CLASSROOM QUESTIONS, A SAMPLE FORMALIZED DATA PROCESSING SECURITY ASSESSMENT, AND A TYPICAL DATA PROCESSING INSURANCE POLICY. A BIBLIOGRAPHY AND AN INDEX ARE PROVIDED. (AUTHOR ABSTRACT MODIFIED).