skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 150806 Find in a Library
Title: Defining the Threat to Information Systems: A Challenge for Security Educators
Journal: Security Awareness Bulletin  Issue:2-94  Dated:(August 1994)  Pages:3-10
Author(s): L F Fischer
Date Published: 1994
Page Count: 8
Type: Survey
Format: Article
Language: English
Country: United States of America
Annotation: This article maps out an appropriate strategy for defense industry security personnel to educate employees about information systems security.
Abstract: The article is premised on two predictions: that educational activities related to information systems security will soon be carried out only by generalist security professionals who lack a specific background in computer science, electrical engineering, or automated information systems; and that information security in all types of environments will remain essentially a human issue. This article emphasizes four primary points. The first is that information systems security is built on long-established principles, policies, and practices, adapted for the modern workplace. The second point is that severe damage to government and defense-related information by both internal and external offenders has occurred in the very recent past; it can happen to any organization, and the damage can be extensive. Foreign intelligence services represent only one type of threat to information systems. Finally, there are steps that every employee can take to minimize the risk of compromise or loss of information. 3 tables and 1 figure
Main Term(s): Computers
Index Term(s): Computer related crime; Computer security training; Crime prevention planning; Information Systems and Technology
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=150806

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.