NCJ Number
38160
Journal
RUTGERS JOURNAL OF COMPUTERS AND THE LAW Volume: 5 Issue: 2 Dated: (1976) Pages: 217-269
Date Published
1976
Length
53 pages
Annotation
THIS ARTICLE SURVEYS THE WAYS OF ASSESSING SECURITY NEEDS AND DESCRIBES MEASURES WHICH CAN BE TAKEN TO PREVENT, DETECT, AND RECOVER FROM SECURITY BREACHES FOR THOSE WITH MINIMAL FAMILIARITY WITH COMPUTERS.
Abstract
RECOMMENDED STEPS IN ASSESSING SECURITY NEEDS INCLUDE DEFINING THE ASSETS REQUIRING PROTECTION, ENUMERATING POTENTIAL THREATS TO THE SECURITY OF ASSETS, AND ESTIMATING THE DEGREE OF SECURITY EXPOSURE OF EACH ASSET. A SYSTEM FOR REDUCING SECURITY EXPOSURES THROUGH APPLYING ELECTRONIC DATA PROCESSING SYSTEMS CONTROLS, PHYSICAL SECURITY CONTROLS, ADMINISTRATIVE CONTROLS AND LEGAL CONTROLS. A SUGGESTION IS MADE THAT A PERIODIC EVALUATION BY AUDITING TEAMS AND MANAGEMENT BE CONDUCTED. LEGAL AND TECHNOLOGICAL LIMITATIONS ON SECURITY SYSTEMS ARE EXPLAINED. A SELECT BIBLIOGRAPHY OF BOOKS AND ARTICLES ON COMPUTER SECURITY FROM SOURCES GENERALLY UNFAMILIAR TO MOST LAWYERS AND MANY OF WHICH CONTAIN REFERENCES TO LEGAL ISSUES AND CASE CITATIONS IS INCLUDED. (AUTHOR ABSTRACT MODIFIED)