NCJ Number
115883
Journal
Security Volume: 26 Issue: 2 Dated: (February 1989) Pages: 48-51
Date Published
1989
Length
4 pages
Annotation
Computer security, like other types, rests on two traditional security axioms: using perimeters to protect assets and making sure that basic protections are in force.
Abstract
The first circle of security uses traditional methods to protect against employee error and fraud. Computer security should be made a fundamental company value, accounting and auditing controls should be implemented, and programmer access should be limited. The second circle involves protecting the computer site through the use of higher level entry controls and adequate fire protection equipment. The third circle protects data stored in the computer system by using one-time-only passwords, computer dial-back devices, software access control, and audit control software. The final circle involves protecting transmitted data through message authentication techniques and encryption hardware. Tempest shields can provide added protection against electronic eavesdropping. In the event of a computer catastrophe, common-sense precautions should be taken to facilitate quick recovery of operations. These include installing a backup computer, storing data at a different site, and securing redundant networks to route data over alternate transmission lines.