skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 52041 Find in a Library
Title: ANALYSIS OF CERTAIN POTENTIAL THREATS TO EFT (ELECTRONIC FUND TRANSFER) SYSTEM SANCTITY
Author(s): ANON
Corporate Author: Kranzley and Co
United States of America
Date Published: 1976
Page Count: 245
Sponsoring Agency: Electronic Industries Foundation
Washington, DC 20006
Kranzley and Co

National Technical Information Service
Springfield, VA 22151
Tow Foundation
New Canaan, CT 06840-4737
Contract Number: TP6AC036
Sale Source: National Technical Information Service
US Dept of Commerce
5285 Port Royal Road
Springfield, VA 22151
United States of America
Language: English
Country: United States of America
Annotation: A TOTAL OF 17 GROSS THREAT CATEGORIES ARE IDENTIFIED AND RELATED TO SPECIFIC POINTS IN ELECTRONIC FUND TRANSFER (EFT) OPERATIONS. A 'THREAT INDEX' IS DEVELOPED AND POTENTIAL SAFEGUARDS ARE DESCRIBED AND EVALUATED.
Abstract: THE 17 MAJOR THREAT CATEGORIES ARE GROUPED UNDER 'INVASION OF PRIVACY,' 'FRAUD AND THEFT,' AND 'CATASTROPHE.' AN EFT SYSTEM IS EXAMINED ZONE-BY-ZONE, THE FUNCTION OF EACH PIECE OF EQUIPMENT IS EXPLAINED, AND THE INTERACTION OF EACH COMPONENT WITH OTHER COMPONENTS AND WITH USERS IS EXAMINED. AN OVERVIEW THEN DISCUSSES POSSIBLE THREATS TO BOTH THE SYSTEM AS A WHOLE AND TO INDIVIDUAL ZONES. CHARTS SUMMARIZE THESE DATA AND PRESENT A 'THREAT INDEX,' BASED ON THE POSSIBILITY THAT THE EVENT COULD TAKE PLACE, NUMBER OF ZONES AFFECTED, AND DAMAGE WHICH COULD BE CAUSED. A CASE EXAMPLE ILLUSTRATES THREAT ASSESSMENT AND DESIGN OF DEFENSE TACTICS. ELECTRONIC SAFEGUARDS AND COMPUTER SECURITY MEASURES ARE DESCRIBED AND EVALUATED. APPENDIXES PROVIDE PROFILES OF COMPANIES ASSISTING IN THE GATHERING OF DATA, A LISTING OF REPRESENTATIVE DEFENSES AVAILABLE OR PLANNED, COMMENTS ON CARD SECURITY IDENTIFICATION MEASURES, AND A PROFILE OF SECURITY ELEMENTS.
Index Term(s): Computer privacy and security; Computer related crime; Data security; Electronic funds transfer; Fraud; Security systems; Techniques; Theft offenses; White collar crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=52041

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.