skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 99004 Find in a Library
Title: Computer Security, the Defense Department, and the Private Sector - A 3-Part Dialogue About Fundamental Objectives and Needs
Journal: Computer Security  Volume:3  Issue:1  Dated:(Summer 1984)  Pages:53-60
Author(s): L D Faurer; R H Courtney
Date Published: 1984
Page Count: 7
Format: Article
Language: English
Country: United States of America
Annotation: This dialog between a security spokesman for the U.S. Department of Defense (DOD) and a private computer security consultant focuses on a disagreement about DOD computer security priorities in the area of user control.
Abstract: The first paper -- presented by the Director of the National Security Agency (NSA), which is responsible for DOD computer security -- reviews the historical development of the DOD computer security system and delineates the responsibilities of the DOD Computer Security Center, the entity in NSA directly responsible for DOD computer security. The paper states that the DOD is required by executive order to protect sensitive national security data from disclosure to or modification by unauthorized individuals. The paper by the private security consultant notes that the security center's definition of a secure computer system focuses on thwarting unauthorized persons from accessing DOD computers, but neglects the control of authorized persons who may misuse their authority to the detriment of national security. In the third paper, a DOD spokesperson responds to the consultant's concern by stating that DOD is concerned for the 'accountability of actions taken by authorized persons.' An editorial comment following this DOD response argues that such accountability refers only to the identification and authentication of the prospective user, not to what the user does after access has been obtained.
Index Term(s): Computer privacy and security; Data integrity; Espionage; National security; US Department of Defense
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.