U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Security, Privacy, and New Technology

NCJ Number
83147
Author(s)
W H Ware
Date Published
1981
Length
19 pages
Annotation
The nature of and procedures for computer security and privacy are discussed.
Abstract
Computer security includes all that must be done to protect a computer system, including its personnel, data, equipment, and communications, against a defined threat, plus access controls to make certain the system provides information only to people authorized to receive it. Computer security safeguards are those in hardware, software, and communication, as well as procedural, personnel, and management controls. These are embedded in an administrative framework that monitors all such controls and ensures that they continue to operate properly. Management must understand that computer defense is not a static matter, since threats to a computer system change dramatically in a short time. As industry and technologists move ahead with old and new systems, networking will significantly increase data exposure and thus increase the risk of a breach of confidentiality or privacy invasion. In the area of data privacy, new systems may create bodies of data about people that will require specific new legal protections related to privacy protection. Further, there should be an awareness that new systems of old ones used in new ways will inadvertently cause social discrimination. Moreover, there may be circumstances in which information about people has a marked increase in exposure or accessibility, requiring legislation to protect such information. A technology that might counter the vulnerability of individual computing centers is that of networking and distributed processing. Such techniques would make it more difficult for a single attack to disable a company or government. The increase in smaller computers will be advantageous for security, because they can be more readily hidden and protected.