skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 78319 Find in a Library
Title: Short-Circuiting Computer Crime
Journal: Security Industry and Product News  Volume:10  Issue:7  Dated:(July 1981)  Pages:18-20
Author(s): D A Janko; F S Atkari
Date Published: 1981
Page Count: 3
Format: Article
Language: English
Country: United States of America
Annotation: Physical security, segregation of employee duties, internal safeguards, signal scrambling, and the auditor's role are discussed as aspects of a computer security system.
Abstract: An already serious problem of computer crime is expected to increase in the years ahead, particularly as easy-to-use, low-cost computers proliferate. Management has the responsibility for devising a security system to prevent such crime. Physical security is one of the simplest and most effective deterrents to electronic crime for businesses using person-sized micro-computer systems. This would restrict access to those directly responsible for its operation. Remote links to micro-systems should be avoided unless other, more sophisticated safeguards have been instituted. All computerized master files should be duplicated and the copies kept in separate locations. Responsibilities for system design, programming, computer operations, and data entry should be segregated among employees, so that no one individual has knowledge and skill sufficient to abuse the computer. Passwords should be required for computer access, and specific entry codes should be assigned to individual functions and operations. Individual terminals should be assigned to specific operations. Programs that will flag accounting operations that do not conform to an established norm should be implemented. Further, if using telephone lines for data transmission, install signal scramblers to inhibit wire taps and prevent unauthorized entry; also, change the access phone number periodically. Finally, an experienced auditor should examine the computer system and recommend safeguards tailored to the system's needs. (Author abstract modified)
Index Term(s): Audits; Computer crime prevention measures; Computer privacy and security; Computer related crime
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.