NCJ Number
78891
Editor(s)
G R Bolotsky
Date Published
1978
Length
35 pages
Annotation
This report introduces methods and techniques for protecting data in an automatic data processing facility and during transmission. The material is presented as an aid in evaluating and selecting security measures following the identification of existing risks and potential losses via a risk analysis.
Abstract
The various classes of hardware and software protective measures mentioned support authorization (definition and control) of system activities involving interactions among people, data, programs, devices, and other named system resources. They also support surveillance of system activity or the means of achieving strict personal accountability of people for their actions; identification of people, devices, and other system resources; data encryption; and system integrity. Other considerations related to system integrity and operational reliability that are discussed are performance, storage requirements, and human factors; functions options; distributed processing architectures; testing procedures; auditing; and documentation. Thirty references are included. (Author abstract modified)