U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

STEP-BY-STEP APPROACH TO COMPUTER SECURITY

NCJ Number
61186
Journal
Security World Volume: 16 Issue: 9 Dated: (SEPTEMBER 1979) Pages: 18-30,42,48,50-52,55
Author(s)
D B PARKER
Date Published
1979
Length
19 pages
Annotation
COMPUTER SECURITY ISSUES ARE ADDRESSED, FOCUSING ON THE NEED FOR SECURITY, BASIC ENVIRONMENTAL AND PERSONNEL CONSIDERATIONS, GUIDELINES ON ESTABLISHING A COMPUTER SECURITY PROGRAM, AND THE COMPUTER CRIMINAL.
Abstract
COMPUTER SECURITY CASES FALL INTO FOUR TYPES: (1) SABOTAGE, (2) INFORMATION FRAUD AND THEFT, (3) FINANCIAL FRAUD AND THEFT, AND (4) UNAUTHORIZED USE OR THEFT OF COMPUTER SERVICES. FINANCIAL FRAUD AND THEFT ARE BECOMING PREVALENT AS MORE LIQUID ASSETS ARE PUT INTO COMPUTERS. SECURITY SUGGESTIONS INCLUDE LIMITING ACCESS TO THE COMPUTER CENTER; INSTALLING TELEPHONES WITHIN THE CENTRAL COMPUTER ROOM WITH DIRECT LINES TO POLICE AND FIRE STATIONS; AND INSTALLING FIRE-RESISTANT WALL, CEILING, AND FLOORING MATERIALS. SECURITY CONTROLS ARE ALSO DISCUSSED FOR PREVENTING OR HINDERING A BREACH IN DATA SECURITY. A PROFILE OF COMPUTER CRIMINALS, THEIR MOTIVES, AND THE SAFEGUARDS AVAILABLE TO THWART THEIR EFFORTS ARE ALSO PRESENTED. THE TYPICAL COMPUTER CRIMINAL IS A 35 YEAR-OLD MALE, MARRIED WITH 2 CHILDREN, AND LIVING IN A RESPECTABLE NEIGHBORHOOD. HE HAS BEEN EMPLOYED BY THE FIRM FOR 3 YEARS, HAS AN INCOME IN THE TOP 40 PERCENT BRACKET, AND STEALS THE EQUIVALENT OF 120 PERCENT OF HIS SALARY. ALSO, THREE CASE HISTORIES OF COMPUTER CRIMINALS AT WORK ARE DISCUSSED. THEY INVOLVE WELFARE FRAUD, TELECOMMUNICATIONS THEFT, AND INFORMATION THEFT. ALTHOUGH CURRENT LAWS ON COMPUTER CRIME ARE NOT WELL DEVELOPED, A SENATE BILL UNDER CONSIDERATION PROPOSES TO MAKE COMPUTER CRIME PUNISHABLE BY 15 YEARS OF IMPRISONMENT AND A $50,000 FINE. (PRG)