U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

CORNERSTONES FOR COMPUTER SECURITY

NCJ Number
14684
Journal
SECURITY REGISTER Volume: 1 Issue: 1 Dated: (JANUARY/FEBRUARY 1974) Pages: 32-35
Author(s)
R V JACOBSON
Date Published
1974
Length
4 pages
Annotation
EFFECTIVE COMPUTER SECURITY REQUIRES SECURITY ANALYSIS, QUALITY CHECKS, CONTINGENCY PLANS, AND INDEPENDENT AUDITING.
Abstract
MORE AND MORE DATA PROCESSING PLAYS A VITAL ROLE IN THE CONDUCT OF DAILY OPERATIONS AND IN CONTROLLING THE FLOW OF ASSETS. FOR BOTH REASONS SECURITY HAS BECOME AN IMPORTANT PERFORMANCE PARAMETER. AN ANALYSIS OF THESE SECURITY REQUIREMENTS BASED ON THE NATURE OF THE DATA PROCESSING TASKS PERFORMED WILL INDICATE THE POTENTIAL LOSS EXPOSURE, WHAT SPECIFIC PROTECTION IS NEEDED AND WHY. FURTHERMORE IT WILL FORM THE BASIS FOR EVALUATING THE COST-EFFECTIVENESS OF REMEDIAL MEASURES. THREE AREAS OFTEN SLIGHTED ARE CONTINGENCY PLANNING, QUALITY CHECKS AND INDEPENDENT AUDITING. ALL THREE, PROPERLY APPLIED TO THE COMPUTER SECURITY PROGRAM, WILL MATERIALLY STRENGTHEN SECURITY AND MUCH REDUCE THE PROBABILITY OF MAJOR LOSSES FROM SECURITY BREECHES. (AUTHOR ABSTRACT)

Downloads

No download available

Availability