U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Structured Approach to Computer Security (From Computer Security, P 181-196, 1981 - See NCJ-88617)

NCJ Number
88619
Author(s)
L P Waring
Date Published
1981
Length
16 pages
Annotation
A structured approach to threat identification reduces the complexity of planning for effective computer security.
Abstract
The article details ways of assessing the causes of loss of security together with the potential consequences of security loss to both the computer system and the whole organization. It examines the role of risk management in identifying threats to security and the broad classifications of risk identification which aid the assessment process. The text asserts that risks are handled either by avoiding, retaining, reducing, or transferring them and that it is best to concentrate on risks to hardware under several broad operational areas. These areas are categorized in the paper so that a structured review can be carried out more naturally. One figure is included. (Author abstract modified)

Downloads

No download available

Availability