skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 68362 Find in a Library
Title: COMPUTER SYSTEM SECURITY
Journal: FINANCIAL EXECUTIVE  Volume:48  Issue:6  Dated:(JUNE 1980)  Pages:28,30-32,34-35
Author(s): C A SRINIVASAN; P E DASCHER
Date Published: 1980
Page Count: 6
Format: Article
Language: English
Country: United States of America
Annotation: THIS JOURNAL ARTICLE PROVIDES AN APPROACH TO DEVELOPING A COMPUTER SECURITY PROGRAM FOR WHICH INDIVIDUALS OUTSIDE THE DATA PROCESSING AREA SHOULD BE RESPONSIBLE BUT WITH THE COOPERATION OF THE DATA PROCESSING MANAGEMENT.
Abstract: MANAGERS SHOULD ANALYZE THE RISKS INVOLVED BY DETERMINING WHETHER THE ASSETS OF THE DATA PROCESSING OPERATIONS ARE ADEQUATELY PROTECTED. DATA PROCESSING ASSETS AND PHYSICAL ASSETS SHOULD BE ASSESSED SEPARATELY. MANAGERS SHOULD IDENTIFY ALL TYPES OF THREATS AND ESTIMATE AN OCCURRENCE PROBABILITY AND COST. ALSO, MANAGERS SHOULD OCCURRENCE PROBABILITY AND COST. ALSO, MANAGERS SHOULD PHYSICAL DESTRUCTION OR THEFT, FRAUD, AND EMBEZZLEMENT. SECURITY INCLUDE FIRE DETECTION AND EXTINGUISHMENT. THE THREATS OF SOFTWARE ERROR, OTHER ERRORS AND OMISSIONS, SABOTAGE, AND THEFT CAN BE PREVENTED BY DATA CENTER ACCESS CONTROL, INPUT/OUTPUT DATA CONTROL AND STORAGE, PASSWORD PROTECTION, EMPLOYEE TERMINATION POLICY, AND APPLICATION SYSTEM DESIGN VERIFICATION AND TEST. DETECTION SAFEGUARDS INCLUDE OPERATION ARE A SURVEILLANCE, AREA ALARM SYSTEMS, INTERNAL CONTROL LOGS, DATA HANDLING AUDIT, AND SELECTED TRANSITIONS AUDIT. THESE ALSO APPLY TO THE THREATS OF WATER DAMAGE, UTILITY OUTAGE, AND HARDWARE FAILURE. FINALLY, THE COST AND BENEFITS OF THE SECURITY MEASURES SHOULD BE ANALYZED. ALTHOUGH THREAT OCCURRENCE PROBABILITIES AND EXPOSURE COSTS ARE DIFFICULT TO MEASURE, THE ARTICLE SUGGESTS THE DEVELOPMENT OF CONTINGENCY PLANS FOR BACKUP OPERATIONS, DISASTER RECOVERY, AND EXPECTED EMERGENCIES; SECURITY AWARENESS THROUGHOUT THE ORGANIZATION; AND CONTINUOUS AUDITS AND TESTS TO CHECK EMERGENCY MEASURES AND IMPROVE EXISTING WEAK SECURITY MECHANISMS. TABLES AND DEFINITIONS ARE INCLUDED. (JLF)
Index Term(s): Computer crime prevention measures; Computer privacy and security; Computer related crime; Data security
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=68362

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.