U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Will Computer Security Keep Pace?

NCJ Number
97641
Journal
Security World Volume: 29 Issue: 4 Dated: (April 1985) Pages: 50-54
Author(s)
C R Armstrong
Date Published
1985
Length
5 pages
Annotation
New hardware and software security technologies for computers have appeared as a result of the increased awareness among management, users, and security administrators of the need for some level of security in nearly all computer environments.
Abstract
The widespread use of personal computers and remote access has indirectly motivated vendors to improve security features. Additional causes of the growing need for security are the increased ability of data technicians to damage computer records through errors or unauthorized intrusions, Federal Government demands for rigorous security standards, and pressure from independent auditors to improve computer security. Despite these demands, computer managers have been relatively slow to react. A new approach is required, one in which security is mandated and supported from the highest management levels. Moreover, users must be intimately involved with computer center security. Users must be motivated to help control access and use of the computer resources and data. Encouraging trends are that (1) data owners are beginning to take responsibility for governing the use and accessibility of their data and that (2) easily installed, comprehensive, and efficient security software is being developed. The newest operating systems include basic security mechanisms. Several packages have been developed that improve operating system security support by providing active security, in which the user's authorization is checked before permission is granted to proceed. The packages also continue to collect surveillance data used to audit security performance. Additional advances are occurring in the hardware area, especially in token recognition and feature identification. Token recognition usually involves cards. Feature recognition devices include retina scanners, voice-print recognition systems, and palm print readers. The emphasis on security system technology is likely to continue.