skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 97641 Find in a Library
Title: Will Computer Security Keep Pace?
Journal: Security World  Volume:29  Issue:4  Dated:(April 1985)  Pages:50-54
Author(s): C R Armstrong
Date Published: 1985
Page Count: 5
Format: Article
Language: English
Country: United States of America
Annotation: New hardware and software security technologies for computers have appeared as a result of the increased awareness among management, users, and security administrators of the need for some level of security in nearly all computer environments.
Abstract: The widespread use of personal computers and remote access has indirectly motivated vendors to improve security features. Additional causes of the growing need for security are the increased ability of data technicians to damage computer records through errors or unauthorized intrusions, Federal Government demands for rigorous security standards, and pressure from independent auditors to improve computer security. Despite these demands, computer managers have been relatively slow to react. A new approach is required, one in which security is mandated and supported from the highest management levels. Moreover, users must be intimately involved with computer center security. Users must be motivated to help control access and use of the computer resources and data. Encouraging trends are that (1) data owners are beginning to take responsibility for governing the use and accessibility of their data and that (2) easily installed, comprehensive, and efficient security software is being developed. The newest operating systems include basic security mechanisms. Several packages have been developed that improve operating system security support by providing active security, in which the user's authorization is checked before permission is granted to proceed. The packages also continue to collect surveillance data used to audit security performance. Additional advances are occurring in the hardware area, especially in token recognition and feature identification. Token recognition usually involves cards. Feature recognition devices include retina scanners, voice-print recognition systems, and palm print readers. The emphasis on security system technology is likely to continue.
Index Term(s): Computer crime prevention measures; Computer facility security; Computer privacy and security; Data security; Fraud and abuse prevention measures; Security systems
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.