skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 64624 Find in a Library
Title: COMPUTER COVERAGE
Journal: SECURITY WORLD  Volume:17  Issue:1  Dated:(JANUARY 1980)  Pages:44-47
Author(s): ANON
Corporate Author: Security World Publishing Co, Inc
United States of America
Date Published: 1980
Page Count: 4
Sponsoring Agency: Security World Publishing Co, Inc
Los Angeles, CA 90034
Format: Article
Language: English
Country: United States of America
Annotation: THE MAGNITUDE OF COMPUTER CRIME IS DESCRIBED AS WELL AS POSSIBLE CONTROLS AND STRATEGIES INCLUDING AUTHORIZATION AND IDENTIFICATION, SURVEILLANCE CONTROLS, SYSTEM INTEGRITY, AND PROSECUTION.
Abstract: COMPUTER CRIME COSTS ARE EXAMINED AT BETWEEN $100 AND $300 MILLION ANNUALLY. ACCORDING TO 1 SECURITY INSTITUTE, MORE THAN 85 PERCENT OF COMPUTER CRIME GOES UNDETECTED. FURTHER, ONLY HALF OF THE KNOWN INCIDENTS GO TO COURT, AND OF THESE, LESS THAN HALF OF THE OFFENDERS ARE CONVICTED. WHILE FEDERAL ASSISTANCE IN PREVENTION IS A POSSIBILITY, MOST ORGANIZATIONS OR BUSINESSES WILL HAVE TO RELY MOST STRONGLY ON DETERRENCE TO COUNTERACT COMPUTER CRIME. DEFENSIVE MEASURES FALL INTO FOUR CATEGORIES: IDENTIFICATION AND AUTHENTIFICATION, WHICH ALLOWS THE PERSON ACCESS TO A COMPUTER SYSTEM; AUTHORIZATION, WHICH LIMITS THE PERSON'S LEVEL OF ACCESS; SURVEILLANCE CONTROLS; AND SYSTEM INTEGRITY. SOME CURRENT METHODS OF IDENTIFICATION, CONSIDERED MORE SECURE THAN COMPUTER PASSWORDS OF ACCESS CARDS, INCLUDE OPTICAL SCANNING FINGERPRINT METHODS, HAND GEOMETRY DEVICES, AND VOICEPRINT AND SIGNATURE IDENTIFICATION SYSTEMS. SURVEILLANCE CONTROLS MIGHT INCLUDE VARIOUS SOFTWARE OR FIRMWARE PACKAGES WITHIN THE COMPUTER OR A SEPARATE MINICOMPUTER FOR MONITORING. SYSTEM INTEGRITY--A FUNCTION OF BOTH MANAGEMENT AND EQUIPMENT VENDORS--INCLUDES PROTECTION OF HARDWARE FROM ACCIDENTAL OR INTENDED DAMAGE. AT PRESENT ONLY 11 STATES HAVE LAWS GOVERNING COMPUTER CRIME, AND COMPUTER SECURITY IS EXPECTED TO RAISE CONTINUING PROBLEMS FOR DATA USERS. PHOTOGRAPHS AND DIAGRAMS ARE INCLUDED. (AOP)
Index Term(s): Computer abuse; Computer crime prevention measures; Computer privacy and security; Computer related crime; Data integrity; Deterrence; Surveillance equipment; White collar crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=64624

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.