U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Carrying out a Computer Security Audit (From Computer Systems Security, P 307-327, 1981 - See NCJ-88617)

NCJ Number
88628
Author(s)
B R Tozer
Date Published
1981
Length
20 pages
Annotation
The paper identifies areas of security weaknesses within organizations and details a practical approach to carrying out an investigative security audit.
Abstract
When an organization seeks advice concerning the computer security measures it is using, it must be sure of its reasons for needing security. After the organization's business objectives and needs have been determined, the actual security audit is carried out. The audit should cover physical security arrangements, external and internal services, computer operations, hardware, software, data, the users' environment(s), audit procedures, personnel, contingency plans, and insurance. Physical security arrangements involve access control (the movement of people and anything they may carry with them), fire protection, and protection against bombs, water, and incidents outside the organization's control. External and internal services may include computer and facility maintenance, data transit, security, water, electricity, gas, oil, and data processing. Questions to ask during the audit are listed for these services as well as for computer operations, hardware, software, the users' environment, etc. Presenting the audit results and implementing its recommendations are detailed. No references are cited.

Downloads

No download available

Availability