NCJ Number
14684
Journal
SECURITY REGISTER Volume: 1 Issue: 1 Dated: (JANUARY/FEBRUARY 1974) Pages: 32-35
Date Published
1974
Length
4 pages
Annotation
EFFECTIVE COMPUTER SECURITY REQUIRES SECURITY ANALYSIS, QUALITY CHECKS, CONTINGENCY PLANS, AND INDEPENDENT AUDITING.
Abstract
MORE AND MORE DATA PROCESSING PLAYS A VITAL ROLE IN THE CONDUCT OF DAILY OPERATIONS AND IN CONTROLLING THE FLOW OF ASSETS. FOR BOTH REASONS SECURITY HAS BECOME AN IMPORTANT PERFORMANCE PARAMETER. AN ANALYSIS OF THESE SECURITY REQUIREMENTS BASED ON THE NATURE OF THE DATA PROCESSING TASKS PERFORMED WILL INDICATE THE POTENTIAL LOSS EXPOSURE, WHAT SPECIFIC PROTECTION IS NEEDED AND WHY. FURTHERMORE IT WILL FORM THE BASIS FOR EVALUATING THE COST-EFFECTIVENESS OF REMEDIAL MEASURES. THREE AREAS OFTEN SLIGHTED ARE CONTINGENCY PLANNING, QUALITY CHECKS AND INDEPENDENT AUDITING. ALL THREE, PROPERLY APPLIED TO THE COMPUTER SECURITY PROGRAM, WILL MATERIALLY STRENGTHEN SECURITY AND MUCH REDUCE THE PROBABILITY OF MAJOR LOSSES FROM SECURITY BREECHES. (AUTHOR ABSTRACT)