U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

COMPUTER SECURITY

NCJ Number
68364
Journal
DATA MANAGEMENT Dated: (JANUARY 1972) Pages: 18-24
Author(s)
B R ALLEN
Date Published
1972
Length
7 pages
Annotation
THE FIVE MAJOR HAZARDS TO A COMPUTER COMPLEX ARE FIRE, WATER, THEFT, FRAUD, AND SABOTAGE, WITH FIRE THE MOST SERIOUS SINGLE HAZARD AND THEFT, FRAUD, AND SABOTAGE THE MOST DIFFICULT TO GUARD AGAINST.
Abstract
COMPUTER FIRES ARE DANGEROUS, NOT ONLY BECAUSE HEAT ERASES MAGNETIC TAPE AND DAMAGES THE COMPUTER, BUT ALSO BECAUSE PARTS GIVE OFF DANGEROUS FUMES WHICH POSE A HAZARD TO THOSE WORKING IN THE COMPUTER ROOM. WATER DAMAGE CAN EITHER COMPOUND THE PROBLEMS CAUSED BY FIRE OR CAN BE A SIGNIFICANT HAZARD IN AND OF ITSELF. PERHAPS THE GREATEST DANGER TO VALUABLE CORPORATE FILES, HOWEVER, IS THE DISGRUNTLED EMPLOYEE WHO ERASES TAPES WITH MAGNETS OR DESTROYS PARTS OF THE COMPUTER WITH WIRE CUTTERS. BOTH COMPUTER DATA AND COMPUTER TIME MAY BE STOLEN EASILY. IN ONE EXAMPLE, EMPLOYEES OF A FIRM ACTUALLY RAN THEIR OWN TIMESHARING FIRM USING THE COMPANY'S COMPUTER TIME AND SUPPLIES. COMPUTERIZATION MAKES CERTAIN TYPES OF EMBEZZLEMENT AND FRAUD EASIER BY GATHERING ALL RECORDS IN ONE PLACE AND DESTROYING THE AUDIT TRAILS THAT EXIST IN MANUAL SYSTEMS. SKILLED PERSONS CAN MANIPULATE THE DATA AND ERASE ALL TRACE OF THE WRONGDOING. COMPUTER ROOMS HAVE ALSO BECOME FAVORITE TARGETS OF DISGRUNTLED OR RADICAL GROUPS. UNIVERSITIES AND CORPORATIONS BOTH HAVE BEEN VICTIMS OF SABOTAGE COMMITTED BY BOTH EMPLOYEES ANDOUTSIDERS. FOR THESE REASONS, GREATER ATTENTION NEEDS TO BE PAID TO COMPUTER SECURITY. TOP MANAGEMENT NEEDS TO BE AWARE OF THE PROBLEM AND INSIST ON SECURITY MEASURES. THIS INFORMAL ARTICLE CONTAINS NUMEROUS EXAMPLES AND CASE HISTORIES.

Downloads

No download available

Availability