U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Security - Some Basic Bytes on Keeping Computer Thieves Out of Your System

NCJ Number
96589
Journal
Security Management Volume: 28 Issue: 2 Dated: (February 1985) Pages: 30-34
Author(s)
A N Pattakos
Date Published
1985
Length
4 pages
Annotation
To curb the damage from computer crime or accident and avoid devastating losses, a security plan should be developed, implemented, and tested for all computer facilities or systems.
Abstract
First, a security survey should be conducted. The management style of the organization will determine whether the approach is quantitative, qualitative, or a combination of the two. Then a plan should be developed, including short-term and long-term programs leading to the implementation of effective security controls, The testing of these controls, and establishment of a feedback system. Crises to plan for include equipment failure; damage to software, files, and documentation; absence of key personnel; inaccessibility or loss of major company assets; severe damage or destruction of the facility; and denial of services to users. To protect against these threats, a plan should be developed to protect data files, computer programs, and computer documentation through inhouse backup and alternate files; to maintain contact with organizations or departments supported by the computer system; and to coordinate with mutual aid organizations. The plan must be written clearly and concisely and be well indexed. Footnotes are included.