U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Security - A Review of Some Problems and Possible Solutions (From Electronic Crime Countermeasures, P 59-64, 1986, John S Jackson, ed. - See NCJ-102815)

NCJ Number
102818
Author(s)
D F Shaw
Date Published
1986
Length
6 pages
Annotation
This review includes a survey of the various security technologies which now involve the use of computers, followed by an analysis of the vulnerable features of a computer system.
Abstract
Breaches of computer security may be hardware- or software-led. While computer hardware is vulnerable to internal attack, such attack requires a breach of a variety of security barriers. Of greater significance is hardware vulnerability to external invasion by illegal traffic on the communications system. Software becomes vulnerable when intruders gain access through the ability to break a code that is intended as a barrier against unauthorized use. To protect against computer crime, it is necessary to provide a way to prevent disclosure of data or processes, manipulation of data or instructions, destruction of data or cancellation of messages, and alteration of data or messages. Security management requires evaluation of hardware and software, personnel functions, data entry and archiving and backup procedures, transaction monitoring, and system logging procedures. Additional protection can be provided by the use of ciphers for the reversible transformation of data. Message authentication and proper selection and training of personnel also are of vital importance. Finally, because computer security measures can be time consuming and costly, security expenditures must be balanced against realistic estimates of losses to computer fraud or related crimes. 26 references.

Downloads

No download available

Availability