U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Financial Executive's Role in Computer Security

NCJ Number
78390
Journal
Financial Executive Volume: 49 Issue: 4 Dated: (April 1981) Pages: 30-32
Author(s)
D Vohs
Date Published
1981
Length
3 pages
Annotation
This article examines the growth of computer crime, types of abuse, and methods of guarding against computer compromise.
Abstract
Computer crime is one of the fastest growing illegal activities. The reason for both the growth and lack of accurate measurement of computer crime is the difficulty in detecting a well-executed theft. Computer thefts are often not reported since management is usually embarrassed to admit that the system failed and fears unfavorable publicity. Computer criminals are often well-educated and have analytical skills that make them valued employees. Types of computer crime include theft of data for the purpose of corporate espionage or extortion, sabotage of the equipment itself, or theft of funds. Computer security involves three basic areas: protection of hardware from physical damage, control of access to equipment and data, and protection of software. Uniform software packages support computer security because program sabotage is most often the work of disgruntled employees. The programs in these packages are written and maintained by professionals who have no vested interest in the operation of the computer and are unaffected by management's policy decisions. But even with a controlled physical environment and uniform software applications, security procedures are only effective if they are strictly adhered to by all employees. No references are supplied.

Downloads

No download available

Availability