skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 51666 Add to Shopping cart Find in a Library
Title: COMPUTER SCIENCE AND TECHNOLOGY - THE NETWORK SECURITY CENTER - A SYSTEM LEVEL APPROACH TO COMPUTER NETWORK SECURITY
Author(s): F HEINRICH
Corporate Author: System Development Corporation
United States of America
Date Published: 1978
Page Count: 74
Sponsoring Agency: National Technical Information Service
Springfield, VA 22151
System Development Corporation
Santa Monica, CA 90406
US Dept of Commerce
Washington, DC
Publication Number: 500-21, VOL 2
Sale Source: National Technical Information Service
US Dept of Commerce
5285 Port Royal Road
Springfield, VA 22151
United States of America
Language: English
Country: United States of America
Annotation: AN APPROACH TO SOLVING DATA SECURITY PROBLEMS THAT ARISE WHEN COMPUTER SYSTEMS ARE JOINED IN A NETWORK CONFIGURATION IS DESCRIBED.
Abstract: THE PROBLEM AT HAND IS CONTROLLING ACCESS TO DATA IN COMPUTERIZED INFORMATION SYSTEMS LINKED FOR USE BY MULTIPLE GOVERNMENT AGENCIES. THE PROPOSED SOLUTION IS BASED ON THE USE OF ONE OR MORE NETWORK SECURITY CENTERS AS GLOBAL ACCESS CONTROL AND AUDITING MECHANISMS, AND ON A 'SECURITY INTERFACE' BETWEEN EACH SITE AND THE NETWORK. THE INTERFACE INCLUDES A REMOTELY KEYABLE CRYPTOGRAPHIC DEVICE. BEFORE A COMMUNICATION CAN BE MADE BETWEEN A USER TERMINAL AND HOST COMPUTER IN THE NETWORK, THE USER MUST FIRST COMMUNICATE WITH THE SECURITY CENTER, WHICH, LIKE THE TERMINAL AND THE HOST COMPUTER, CONTAINS THE CRYPTOGRAPHIC DEVICE. THE SYSTEM CONTROLS ACCESS TO DATA CONTAINED IN THE NETWORK AND KEEPS TRACK OF ILLEGAL ACCESS ATTEMPTS. TECHNICAL DETAILS OF THE OPERATION OF THE NETWORK SECURITY CENTER ARE PROVIDED, TOGETHER WITH RECOMMENDATIONS FOR IMPLEMENTING CENTERS TO SUIT THE NEEDS OF VARIOUS NETWORKS. IT IS NOTED THAT THE SECURITY CENTER APPROACH CAN EFFECTIVELY CONTROL ACCESS, COLLECT AUDIT DATA, AND PROVIDE PROTECTION AGAINST UNAUTHORIZED MODIFICATION OF DATA BASES. IT IS FURTHER NOTED THAT, BECAUSE MULTIPLE CENTERS CAN OPERATE TOGETHER, THE PROPOSED SECURITY APPROACH CAN TAKE INTO ACCOUNT SUCH ISSUES AS MODULAR EXPANDABILITY, REGIONAL SUBNETWORKS, AND LOCAL CONTROL OVER RESOURCES. (LKM)
Index Term(s): Computer privacy and security; Data security; Information Systems and Technology; Privacy and security
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=51666

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.