skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 68154 Find in a Library
Title: ROLE OF COMPUTER TECHNOLOGY IN FRAUD PREVENTION - REMARKS (FROM SECRETARY'S NATIONAL CONFERENCE ON FRAUD, ABUSE, AND ERROR - PROTECTING THE TAXPAYER'S DOLLAR, P 151-160, 1978 - SEE NCJ-68143)
Author(s): C WEISSMAN
Date Published: 1979
Page Count: 10
Sponsoring Agency: Superintendent of Documents, GPO
Washington, DC 20402
Sale Source: Superintendent of Documents, GPO
Washington, DC 20402
United States of America
Language: English
Country: United States of America
Annotation: THIS CONFERENCE PANEL ADDRESSES STEPS TO BE TAKEN TO PREVENT, MONITOR, AND DETECT COMPUTER FRAUD AND ABUSE BY USING THE COMPUTER ITSELF.
Abstract: AN OVERALL POLICY FOR SECURITY ENFORCEMENT AND SYSTEM PROTECTION AGAINST FRAUD IS INTRODUCED AS THE FOUNDATION FOR ACQUIRING TECHNOLOGICAL EQUIPMENT AND EXPERTISE. COMPUTER SECURITY REQUIREMENTS ARE THEN OUTLINED, EMPHASIZING SAFETY, PRIVACY, AND SECURITY IN EACH STEP OF ELECTRONIC DATA OPERATION. THESE STEPS INCLUDE DATA CAPTURE AND DISPLAY, DATA TRANSMISSION, DATA STORAGE, DATA RETRIEVAL, DATA PROCESSING, AND DATA CONTROL. SECURITY REQUIREMENTS FOR PHYSICAL PERIMETERS ARE CONSIDERED. AN OVERVIEW OF A COMPUTER SECURITY ENFORCEMENT SYSTEM IS PRESENTED WITH DESCRIPTIONS OF ENFORCEMENT ALTERNATIVES DEVELOPED TO SERVE THE DEPARTMENT OF DEFENSE (DOD). THESE ENFORCEMENT ALTERNATIVES INCLUDE PERIODS PROCESSING, AUTOMATED PERIODS PROCESSING, SECURE DISTRIBUTED PROCESSING, SECURE SUBSYSTEMS, AND SECURITY KERNEL BASED OPERATING SYSTEMS. THE RATIONALE AND PROCESS FOR SECURITY ACCREDITATION ARE EXPLORED, AND A NOTE OF CAUTION IS EXTENDED TO COMPUTER SYSTEM BUYERS REGARDING THEIR RESPONSIBILITY FOR DEMANDING SECURITY SYSTEMS FROM COMPUTER SYSTEM DESIGNERS AND VENDORS. FINALLY, A SUMMARY OF THE PANEL DISCUSSIONS AND QUESTIONS-AND-ANSWER PERIOD IS PROVIDED. FLOW CHARTS ILLUSTRATE THE DOD SECURITY SYSTEM ALTERNATIVES, THE STEPS TOWARD SYSTEM ACCREDITATIONS, AND THE OPPORTUNITIES FOR SECURITY DESIGN WITHIN COMPUTER SYSTEM LIFECYCLES. (MHP)
Index Term(s): Computer abuse; Computer crime prevention measures
Note: NCJ-68154 AVAILABLE ON MICROFICHE FROM NCJRS UNDER NCJ68143.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=68154

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.