skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 201475 Find in a Library
Title: Secure Data Makes for a Secure Department
Journal: Law Enforcement Technology  Volume:30  Issue:7  Dated:July 2003  Pages:72,74-80,84
Author(s): Christa Miller
Date Published: July 2003
Page Count: 7
Type: Best Practice/State-of-the-Art Review
Format: Article
Language: English
Country: United States of America
Annotation: This article describes the computer security needs of law enforcement and discusses products that meet these needs.
Abstract: In the wake of high-profile attacks on FBI and other government and law enforcement Web sites, agencies need to reevaluate their computer security systems. The author begins by describing how firewalls work and their vulnerabilities. One limitation of firewalls is that they do not provide enough information back to the security professional to know whether the firewall is effectively protecting the network. The article encourages law enforcement agencies to consider using Network IDS’s to protect the network and Host IDS’s to protect individual computers. Next, the importance of authentication methods to allow authorized users to access the protected data. The most common type of authentication method is a password system, but password systems are too weak to protect confidential data. The author describes some of the other types of authentication methods on the market that are more secure, such as SafeWord Premier Access and MobilePass. The next section discusses the importance of encryption-related products, which protects data once it is actually transmitted within the network. Encryption allows for the authentication of unaltered data and the authentication of network users. In this way, confidential data sent through the network cannot be tapped into by anyone other than the intended recipient. Finally, the article examines virus protection, and describes the PC-cillin product made by Trend Micro. The article includes a textbox on how to assess ones vulnerability to cyber attack.
Main Term(s): Computer privacy and security
Index Term(s): Computer software; Computer viruses
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.