skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 98757 Find in a Library
Title: Computer-Security Technology
Author(s): J A Cooper
Date Published: 1984
Page Count: 173
Sponsoring Agency: D C Heath and Co
Lexington, MA 02173
Sale Source: D C Heath and Co
125 Spring Street
Lexington, MA 02173
United States of America
Language: English
Country: United States of America
Annotation: This book provides the technical information necessary for making the right decisions on computer information security and physical assets security.
Abstract: A survey of the constituents used in contemporary computer systems provides the background from which safeguards are examined. An overview of hardware focuses on equipment associated with data and information processing or computing activities; a review of software and systems considers operating systems, translators, firmware, applications programs, the information base, system architecture and component technology, and computer users. The discussion of computer security measures begins with procedural security techniques, notably access controls for getting to and using computers; reading, writing, and manipulating files; handling computer-related documentation; tracking personnel behavior; and providing backup and recovery. The chapter on security technology for computer hardware covers access control, information protection, and facilities protection. Consideration of security technology for computer software encompasses access controls, encryption routines, kernelized or partitioned systems, risk analysis packages, comparators, and logging and auditing software. Methods for evaluating the effectiveness of computer security programs are also reviewed. Some of the methods described are electronic data processing auditing, file and transaction monitoring, log examination, password pickup, incident reporting, security tests, and data analysis. Appendixes list technology suppliers and vendor categories. A glossary and index are provided, along with approximately 130 reference listings.
Index Term(s): Computer crime prevention measures; Computer hardware systems; Computer privacy and security; Computer related crime; Computer software; Data security; Security management
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.