skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 41382 Find in a Library
Title: COMPUTER SECURITY AND PROTECTION STRUCTURES
Author(s): B J WALKER; I F BLAKE
Date Published: 1977
Page Count: 151
Sponsoring Agency: Dowden, Hutchinson and Ross, Inc
Stroudsberg, PA 18360
Sale Source: Dowden, Hutchinson and Ross, Inc
Box 669
523 Sarah Street
Stroudsberg, PA 18360
United States of America
Language: English
Country: United States of America
Annotation: IN RESPONSE TO THE BURGEONING NEED FOR BETTER INFORMATION ON ALL TYPES OF COMPUTER SECURITY, THIS BOOK EXAMINES THE TECHNICAL ASPECTS OF THE SUBJECT AT A LEVEL THAT THE NONEXPERT, STUDENT AND PROFESSIONAL, CAN UNDERSTAND.
Abstract: THE WHOLE GAMUT OF SECURITY PROBLEMS IS CONSIDERED, INCLUDING PHYSICAL ATTACKS, MORE SUBTLE SOFTWARE PENETRATION, AND ACCIDENTAL THREATS SUCH AS MAGNETISM AND HARDWARE ERROR. BECAUSE COMPUTER SYSTEMS HAVE ONLY RARELY BEEN DESIGNED WITH SECURITY IN MIND, ABSOLUTE INVIOLABILITY IS GENERALLY CONSIDERED TO BE IMPOSSIBLE. A CRITERION FOR THE PROTECTION STRUCTURES CONSIDERED IS THAT THEY MAKE THE COST OF PENETRATING A SYSTEM SO HIGH THAT THIS COST EXCEEDS ANY POSSIBLE GAIN THE ILL-GOTTEN INFORMATION COULD PROVIDE. VIGOROUS ATTENTION IS GIVEN TO DEFENSES AGAINST UNAUTHORIZED ACCESS: ADMINISTRATIVE AND HARDWARE SAFEGUARDS, REMOTE TERMINAL SECURITY, PROTECTION OF THE OPERATING SYSTEM DESIGN, DATA TRANSMISSION, AND CRYPTOGRAPHY. A SURVEY OF A NUMBER OF IMPLEMENTED PROTECTION SYSTEMS - THE UNIX, THE IBM RUSH AND TSS/360, THE HONEYWELL MULTICS, THE HONEYWELL 6000 SERIES, AND MANY OTHERS - ILLUSTRATES WHAT IS AVAILABLE AND PROVIDES LEADS FOR ADDITIONAL INFORMATION SOURCES. A 17-PAGE BIBLIOGRAPHY AND AN INDEX ARE PROVIDED. (AUTHOR ABSTRACT)...ELW
Index Term(s): Computer hardware systems; Computer privacy and security; Computer software; Computer Terminals; Computers; Data integrity; Data security
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=41382

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.