NCJ Number
13956
Journal
DATAMATION Volume: 20 Issue: 1 Dated: (JANUARY 1974) Pages: 51-55
Date Published
1974
Length
5 pages
Annotation
METHODS FOR PREVENTION OF ILLEGAL ACCESS TO DATA, OF DATA MODIFICATION, OR OF INTERFERENCE WITH NORMAL COMPUTER OPERATION, THEIR EFFECTIVENESS, AND EASE OF UTILIZATION OR CIRCUMVENTION.
Abstract
CRYPTOGRAPHY, CODING, ARTIFICIAL RANDOM ERRORS, AND KEYWORDS ARE SOME TOOLS FOR PREVENTING ILLEGAL INFORMATION ACCESS. THESE AND OTHER SOFTWARE SAFEGUARDS CAN BE USEFUL IF PROPERLY IMPLEMENTED. HOWEVER, THE CENTRAL POINT OF SECURITY ON A COMPUTER IS THE OPERATING SYSTEM AND THE BASIC HARDWARE. NO GADGETRY LIKE CRYPTOGRAPHY OR ERRORS INTENTIONALLY INTRODUCED INTO THE DATA WILL GIVE SECURITY IF THERE ARE LOOPHOLES IN THE OPERATING SYSTEM OR THE CENTRAL HARDWARE. (AUTHOR ABSTRACT MODIFIED)