U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

MAINTAINING INTEGRITY

NCJ Number
143524
Journal
Security Management Dated: (June 1993) Pages: 26A-28A,30A
Author(s)
E E Truncer; M L Magee
Date Published
1993
Length
4 pages
Annotation
To ensure that a corporate computer system's access control system is properly maintained, managers need to implement processes that ensure its integrity, establish proper administrative and operational controls, and monitor performance.
Abstract
A written systems management policy should include an overview of the system and its objectives, selected features, and general operation, as well as a diagram of the access control system's configuration. Often, mistakes are made when new features are implemented or existing features are adjusted and no quality assurance testing is performed; these mistakes may involve staggered connection times, time zones, and anti- passback. Other elements that need to be highlighted in computer security guidelines include alarm management, which ensures that operators receive the alarm and respond promptly and efficiently; passwords and operators; periodic access control reports to provide management with the information necessary to audit and maintain the system's data integrity; badges; system backups and maintenance; and a disaster recovery program, which encompasses both planning for contingency responses and managing emergency operations.

Downloads

No download available

Availability