skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 83147 Find in a Library
Title: Security, Privacy, and New Technology
Author(s): W H Ware
Date Published: 1981
Page Count: 19
Sponsoring Agency: National Institute of Justice/
Rockville, MD 20849
Rand Corporation
Santa Monica, CA 90407-2138
Publication Number: P-6606
Sale Source: Rand Corporation
1776 Main Street
P.O. Box 2138
Santa Monica, CA 90407-2138
United States of America

National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America
Document: PDF
Language: English
Country: United States of America
Annotation: The nature of and procedures for computer security and privacy are discussed.
Abstract: Computer security includes all that must be done to protect a computer system, including its personnel, data, equipment, and communications, against a defined threat, plus access controls to make certain the system provides information only to people authorized to receive it. Computer security safeguards are those in hardware, software, and communication, as well as procedural, personnel, and management controls. These are embedded in an administrative framework that monitors all such controls and ensures that they continue to operate properly. Management must understand that computer defense is not a static matter, since threats to a computer system change dramatically in a short time. As industry and technologists move ahead with old and new systems, networking will significantly increase data exposure and thus increase the risk of a breach of confidentiality or privacy invasion. In the area of data privacy, new systems may create bodies of data about people that will require specific new legal protections related to privacy protection. Further, there should be an awareness that new systems of old ones used in new ways will inadvertently cause social discrimination. Moreover, there may be circumstances in which information about people has a marked increase in exposure or accessibility, requiring legislation to protect such information. A technology that might counter the vulnerability of individual computing centers is that of networking and distributed processing. Such techniques would make it more difficult for a single attack to disable a company or government. The increase in smaller computers will be advantageous for security, because they can be more readily hidden and protected.
Index Term(s): Computer crime prevention measures; Computer privacy and security; Data security
Note: This paper is part of the Rand Paper Series and was presented at First International Cii Honeywell-Bull Symposium on Computer Security and Privacy - Top Secret 81 at Monte Carlo, Monaco, January 28, 1981.
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.