NCJ Number
146521
Journal
Computer Security Journal Volume: 8 Issue: 2 Dated: (Fall 1992) Pages: 31- 41
Date Published
1992
Length
11 pages
Annotation
The interconnection of computers has dramatically changed requirements for information security and has made necessary a new and more structured approach for identifying and documenting these requirements.
Abstract
A new type of document is a network security architecture. This document is a master plan for the integration of security into voice and data communications systems. Threats to computer networks include the unavailability of service or data, message replay, active or passive wiretapping, unauthorized usage, software bugs, malicious software interference, data diddling, inadequate physical access controls, inadequate administration of logical access control, errors and omissions, inadequate training, inadequate documentation, and inadequate supervision. Objectives of security design should include isolated security functions, automated security administration, dynamic reconfiguration of systems to provide sustainable security, and lower-profile system resources. The components of a network security architecture include a management summary, policies and objectives, scope and applicability, definitions, timeline, explanations, and several other items. Footnotes