U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Security - Readings From Security Management Magazine

NCJ Number
104480
Editor(s)
S M Gallery
Date Published
1987
Length
317 pages
Annotation
A series of articles from 'Security Management Magazine' examine threats to computer security and recommend ways to enhance security through risk assessment, security evaluation, and physical and software security measures.
Abstract
Part 1 examines general issues in computer security management, including sources of vulnerability and the need to allocate the responsibility for security programs to appropriately trained personnel. Part 2 provides guidelines for assessing liability and risks associated with electronic data processing (EDP) security, and discusses the costs and difficulties in conducting a risk analysis. Part 3 offers guidelines for selectively focusing security protection efforts both inside and outside the workplace. In Part 4, computer criminals are profiled and data on the relationship between the proliferation of computers and computer-related crime are presented. Part 5 examines the role of policies, computing procedures, and safeguards (such as off-site data storage and cryptography) in EDP and information security. Part 6 discusses a variety of physical security issues such as fire safety, physical access control, office design, and protection of computer inputs and outputs. Software access controls also are described. Finally, the role of the questioned document examiner in proving a suspected computer crime is delineated. Chapter footnotes, references, figures, and index.