U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

METHODS AND PROBLEMS IN COMPUTER SECURITY

NCJ Number
38160
Journal
RUTGERS JOURNAL OF COMPUTERS AND THE LAW Volume: 5 Issue: 2 Dated: (1976) Pages: 217-269
Author(s)
R T SLIVKA; J W DARROW
Date Published
1976
Length
53 pages
Annotation
THIS ARTICLE SURVEYS THE WAYS OF ASSESSING SECURITY NEEDS AND DESCRIBES MEASURES WHICH CAN BE TAKEN TO PREVENT, DETECT, AND RECOVER FROM SECURITY BREACHES FOR THOSE WITH MINIMAL FAMILIARITY WITH COMPUTERS.
Abstract
RECOMMENDED STEPS IN ASSESSING SECURITY NEEDS INCLUDE DEFINING THE ASSETS REQUIRING PROTECTION, ENUMERATING POTENTIAL THREATS TO THE SECURITY OF ASSETS, AND ESTIMATING THE DEGREE OF SECURITY EXPOSURE OF EACH ASSET. A SYSTEM FOR REDUCING SECURITY EXPOSURES THROUGH APPLYING ELECTRONIC DATA PROCESSING SYSTEMS CONTROLS, PHYSICAL SECURITY CONTROLS, ADMINISTRATIVE CONTROLS AND LEGAL CONTROLS. A SUGGESTION IS MADE THAT A PERIODIC EVALUATION BY AUDITING TEAMS AND MANAGEMENT BE CONDUCTED. LEGAL AND TECHNOLOGICAL LIMITATIONS ON SECURITY SYSTEMS ARE EXPLAINED. A SELECT BIBLIOGRAPHY OF BOOKS AND ARTICLES ON COMPUTER SECURITY FROM SOURCES GENERALLY UNFAMILIAR TO MOST LAWYERS AND MANY OF WHICH CONTAIN REFERENCES TO LEGAL ISSUES AND CASE CITATIONS IS INCLUDED. (AUTHOR ABSTRACT MODIFIED)

Downloads

No download available

Availability