NCJ Number
115610
Date Published
1989
Length
23 pages
Annotation
Because computers are vulnerable to crime, it is important for law enforcement personnel and organizations utilizing computers to increase their knowledge of what constitutes computer security.
Abstract
The chapter summarizes security approaches relating to hardware, software, and communications and identifies defense mechanisms for computer security, including physical security, personnel security, and the encryption of sensitive information. Organizations that use computers to manage and store sensitive information should identify a security coordinator and give that person responsibility for threat evaluation, security procedures, countermeasures, backup and recovery planning, intelligence, and security training. An appendix contains a computer security checklist.