skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 68364 Find in a Library
Title: COMPUTER SECURITY
Journal: DATA MANAGEMENT  Dated:(JANUARY 1972)  Pages:18-24
Author(s): B R ALLEN
Date Published: 1972
Page Count: 7
Format: Article
Language: English
Country: United States of America
Annotation: THE FIVE MAJOR HAZARDS TO A COMPUTER COMPLEX ARE FIRE, WATER, THEFT, FRAUD, AND SABOTAGE, WITH FIRE THE MOST SERIOUS SINGLE HAZARD AND THEFT, FRAUD, AND SABOTAGE THE MOST DIFFICULT TO GUARD AGAINST.
Abstract: COMPUTER FIRES ARE DANGEROUS, NOT ONLY BECAUSE HEAT ERASES MAGNETIC TAPE AND DAMAGES THE COMPUTER, BUT ALSO BECAUSE PARTS GIVE OFF DANGEROUS FUMES WHICH POSE A HAZARD TO THOSE WORKING IN THE COMPUTER ROOM. WATER DAMAGE CAN EITHER COMPOUND THE PROBLEMS CAUSED BY FIRE OR CAN BE A SIGNIFICANT HAZARD IN AND OF ITSELF. PERHAPS THE GREATEST DANGER TO VALUABLE CORPORATE FILES, HOWEVER, IS THE DISGRUNTLED EMPLOYEE WHO ERASES TAPES WITH MAGNETS OR DESTROYS PARTS OF THE COMPUTER WITH WIRE CUTTERS. BOTH COMPUTER DATA AND COMPUTER TIME MAY BE STOLEN EASILY. IN ONE EXAMPLE, EMPLOYEES OF A FIRM ACTUALLY RAN THEIR OWN TIMESHARING FIRM USING THE COMPANY'S COMPUTER TIME AND SUPPLIES. COMPUTERIZATION MAKES CERTAIN TYPES OF EMBEZZLEMENT AND FRAUD EASIER BY GATHERING ALL RECORDS IN ONE PLACE AND DESTROYING THE AUDIT TRAILS THAT EXIST IN MANUAL SYSTEMS. SKILLED PERSONS CAN MANIPULATE THE DATA AND ERASE ALL TRACE OF THE WRONGDOING. COMPUTER ROOMS HAVE ALSO BECOME FAVORITE TARGETS OF DISGRUNTLED OR RADICAL GROUPS. UNIVERSITIES AND CORPORATIONS BOTH HAVE BEEN VICTIMS OF SABOTAGE COMMITTED BY BOTH EMPLOYEES ANDOUTSIDERS. FOR THESE REASONS, GREATER ATTENTION NEEDS TO BE PAID TO COMPUTER SECURITY. TOP MANAGEMENT NEEDS TO BE AWARE OF THE PROBLEM AND INSIST ON SECURITY MEASURES. THIS INFORMAL ARTICLE CONTAINS NUMEROUS EXAMPLES AND CASE HISTORIES.
Index Term(s): Computer crime prevention measures; Computer privacy and security; Data integrity; Data security
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=68364

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.