NCJ Number
126139
Journal
Journal of Systems Management Volume: 40 Issue: 10 Dated: (October 1989) Pages: 21-27
Date Published
1989
Length
7 pages
Annotation
As more companies choose to computerize their operations through network utilization, the need for computer security becomes more urgent. The advantages of networking, the improved capabilities of networking systems, and the inexpensiveness of powerful computers can be offset by the prevalence of security problems within this type of system.
Abstract
Computer threats can generally be classified as acts of God or man-made disasters; while some are controllable or partially controllable, others are not. The newest threat, computer viruses, can destroy entire systems. Security measures to counteract these threats can be classified as general, physical, or software measures. General systems security consists of biometrical and non-biometrical measures. Physical security consists of identification badges, proximity release door opener, corner bolts, steel encasement, electronic trackers, token, cable shielding, and room shielding. Finally, software security includes passwords, access codes, and terminal resource security. A typical computer-based information system (CBIS) contains data and data entry system, data base management system, data processing and transmission, and information and data output; all of these components must be protected. Guidelines for comprehensive security measures are outlined, as well as steps to follow in cases where security measures fail. 3 tables, 1 figure, and 11 references.