U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Protecting Information in the Electronic Workplace - A Guide for Managers

NCJ Number
99297
Author(s)
J A Schweitzer
Date Published
1983
Length
150 pages
Annotation
This book defines and illustrates the various systems products included in office automation, word processing, and management workstations; it proposes a program for electronic information security.
Abstract
Attention is directed to the influence of computer technology in the workplace and the value of information; personal workstation automation (PWA) systems and components; and descriptions of PWA communication, information storage, computing, software creation, and systems integration functions. A structure for information security management is proposed that consists of policy documentation, implementation and modification, program maintenance, and program review. Physical, logical, and procedural security measures then are delineated. Physical measures include restricting physical access to a place or object; logical security measures restricting access to information, such as the use of software systems that implement access control through passwords, fingerprint or voice recognition; and procedural security measures providing controls over authorization to see or use information. Cases of computer-related fraud illustrate such common methodologies as introduction of unauthorized inputs, manipulation of inputs during data entry, diversion of outputs, and manipulation of hardware and systems software. A primer for protecting information in PWA systems is provided, along with examples of the application of physical, logical, and procedural security elements. Diagrams, tables, 29 references, and an index are provided. Appendixes include model security policy and standards, an employee security booklet, and a security checklist.