skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 65127 Find in a Library
Title: FOILING THE COMPUTER CRIMINAL
Journal: BANKING  Volume:70  Issue:5  Dated:(MAY 1978)  Pages:67-70
Author(s): F J ALBI
Corporate Author: Simons-Boardman Publishing Corp
United States of America
Date Published: 1978
Page Count: 4
Sponsoring Agency: Simons-Boardman Publishing Corp
New York, NY 10013
Format: Article
Language: English
Country: United States of America
Annotation: DATA ENCRYPTION AND PASSWORD SELECTION, MAINTENANCE, AND PROTECTION CAN HELP SECURE BANKS AGAINST COMPUTER CRIMINALS WHO MIGHT USE THE DATA TO DEFRAUD A BANK, GAIN A BUSINESS ADVANTAGE, OR FOR POLITICAL PURPOSES.
Abstract: INDIVIDUALS WISHING TO STEAL FROM BANKS, DAMAGE A BANK'S ELECTRONIC DATA PROCESSING (EDP) OPERATIONS, OR SIMPLY OBTAIN INFORMATION CAN USE COMPUTER TIMESHARING SYSTEMS. SUCH SYSTEMS ARE EFFECTIVE TOOLS FOR PENETRATING A BANK'S COMPUTER WITHOUT DETECTION AND WITHOUT ENTERING THE BANK'S COMPUTER WITHOUT DETECTION AND WITHOUT ENTERING THE BANK'S PREMISES. LOSSES FROM FUNDS OR COMPUTER RESOURCE THEFT, SABOTAGE, MASTER-MODE EXECUTIONS, AND DAMAGE TO APPLICATION PROGRAMS COULD RESULT. SYSTEMS CAN BE PENETRATED THROUGH WIRE TAPPING, DISCOVERY OF THE CORRECT TIMESHARING TELEPHONE NUMBER, AND DISCOVERY OF USER IDENTIFICATIONS AND PASSWORDS. PROTECTION MEASURES INCLUDE THE ADOPTION OF A SYSTEM IDENTIFICATION CODE (SYSTEM ID) WHICH ADDS AN ADDITIONAL LEVEL OF PASSWORD PROTECTION AND CAN EASILY BE CHANGED WITHOUT MODIFING USER IDS. TIMESHARING NUMBERS CAN ALSO BE ASSIGNED; THE SWITCHBOARD OPERATOR CAN EASILY RECOGNIZE THESE NUMBERS AND REFUSE CONNECTIONS TO THOSE EXTENSIONS. OUTSIDE TIMESHARING LINES CAN BE ENCRYPTED. GOOD PASSWORD SELECTION CRITERIA SUCH AS AVOIDANCE OF OBVIOUS CHOICES BASED ON COMPANY NAMES OR BUSINESS SHOULD BE ADOPTED. IN ADDITION, PASSWORDS SHOULD BE CHANGED REGULARLY, MASTER LISTS SHOULD BE PROTECTED, AND MEASURES SHOULD BE TAKEN TO LIMIT LOSSES ONCE THE SYSTEM HAS BEEN PENETRATED.(AOP)
Index Term(s): Computer crime prevention measures; Computer privacy and security; Crime Control Programs; Deterrence; Electronic funds transfer; Physical crime prevention
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=65127

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.