U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

ROLE OF COMPUTER TECHNOLOGY IN FRAUD PREVENTION - REMARKS (FROM SECRETARY'S NATIONAL CONFERENCE ON FRAUD, ABUSE, AND ERROR - PROTECTING THE TAXPAYER'S DOLLAR, P 151-160, 1978 - SEE NCJ-68143)

NCJ Number
68154
Author(s)
C WEISSMAN
Date Published
1979
Length
10 pages
Annotation
THIS CONFERENCE PANEL ADDRESSES STEPS TO BE TAKEN TO PREVENT, MONITOR, AND DETECT COMPUTER FRAUD AND ABUSE BY USING THE COMPUTER ITSELF.
Abstract
AN OVERALL POLICY FOR SECURITY ENFORCEMENT AND SYSTEM PROTECTION AGAINST FRAUD IS INTRODUCED AS THE FOUNDATION FOR ACQUIRING TECHNOLOGICAL EQUIPMENT AND EXPERTISE. COMPUTER SECURITY REQUIREMENTS ARE THEN OUTLINED, EMPHASIZING SAFETY, PRIVACY, AND SECURITY IN EACH STEP OF ELECTRONIC DATA OPERATION. THESE STEPS INCLUDE DATA CAPTURE AND DISPLAY, DATA TRANSMISSION, DATA STORAGE, DATA RETRIEVAL, DATA PROCESSING, AND DATA CONTROL. SECURITY REQUIREMENTS FOR PHYSICAL PERIMETERS ARE CONSIDERED. AN OVERVIEW OF A COMPUTER SECURITY ENFORCEMENT SYSTEM IS PRESENTED WITH DESCRIPTIONS OF ENFORCEMENT ALTERNATIVES DEVELOPED TO SERVE THE DEPARTMENT OF DEFENSE (DOD). THESE ENFORCEMENT ALTERNATIVES INCLUDE PERIODS PROCESSING, AUTOMATED PERIODS PROCESSING, SECURE DISTRIBUTED PROCESSING, SECURE SUBSYSTEMS, AND SECURITY KERNEL BASED OPERATING SYSTEMS. THE RATIONALE AND PROCESS FOR SECURITY ACCREDITATION ARE EXPLORED, AND A NOTE OF CAUTION IS EXTENDED TO COMPUTER SYSTEM BUYERS REGARDING THEIR RESPONSIBILITY FOR DEMANDING SECURITY SYSTEMS FROM COMPUTER SYSTEM DESIGNERS AND VENDORS. FINALLY, A SUMMARY OF THE PANEL DISCUSSIONS AND QUESTIONS-AND-ANSWER PERIOD IS PROVIDED. FLOW CHARTS ILLUSTRATE THE DOD SECURITY SYSTEM ALTERNATIVES, THE STEPS TOWARD SYSTEM ACCREDITATIONS, AND THE OPPORTUNITIES FOR SECURITY DESIGN WITHIN COMPUTER SYSTEM LIFECYCLES. (MHP)