NCJ Number
127987
Journal
Information Age Volume: 12 Issue: 4 Dated: (October 1990) Pages: 213-216
Date Published
1990
Length
4 pages
Annotation
This paper discusses issues relevant to implementing a computer security policy, particularly through structured methodology.
Abstract
It presents a computer security (CS) methodology comprised of five clearly defined phases, arranged in predetermined chronological sequence: initiation; computer security policy; risk analysis and project definition; installation; and maintenance. Terminology issues, purpose of computer security, definition of scope of computer security, and accountability and responsibility are important considerations in development of CS policy. In addition, technological CS comprised of physical and logical security need to be addressed for protection of data and programs in the system and hardware resources of a computer system, respectively. Application computer security is also important for the development of applications or production of reliable software. The CS methodology provides a comprehensive management tool for implementation of computer security in any organization. 1 figure, 1 table, and 7 references