NCJ Number
99297
Date Published
1983
Length
150 pages
Annotation
This book defines and illustrates the various systems products included in office automation, word processing, and management workstations; it proposes a program for electronic information security.
Abstract
Attention is directed to the influence of computer technology in the workplace and the value of information; personal workstation automation (PWA) systems and components; and descriptions of PWA communication, information storage, computing, software creation, and systems integration functions. A structure for information security management is proposed that consists of policy documentation, implementation and modification, program maintenance, and program review. Physical, logical, and procedural security measures then are delineated. Physical measures include restricting physical access to a place or object; logical security measures restricting access to information, such as the use of software systems that implement access control through passwords, fingerprint or voice recognition; and procedural security measures providing controls over authorization to see or use information. Cases of computer-related fraud illustrate such common methodologies as introduction of unauthorized inputs, manipulation of inputs during data entry, diversion of outputs, and manipulation of hardware and systems software. A primer for protecting information in PWA systems is provided, along with examples of the application of physical, logical, and procedural security elements. Diagrams, tables, 29 references, and an index are provided. Appendixes include model security policy and standards, an employee security booklet, and a security checklist.