U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Spreading Danger of Computer Crime

NCJ Number
79643
Journal
Business Week Dated: (April 20, 1981) Pages: 86-92
Author(s)
Anonymous
Date Published
1981
Length
7 pages
Annotation
The growing danger of computer crime and some ways to counter it are discussed.
Abstract
Three computer developments are creating new risks of fraud that are particularly alarming for business: the spread of low-cost personal computers, the soaring number of students and others who are learning how to use computers, and the large number of employees who can access computers through the remote terminal. Until recently, computer security at most companies has meant little more than physically protecting computer rooms with private guards, elaborate locks, and magnetic card-access systems. Some computer security developments include encryption hardware that electronically scrambles a funds transfer message during transmission, so that only a receiving bank, usually a similarly programmed encryption device, can unscramble the message. Sophisticated safeguards against internal computer frauds have also emerged. Secret passwords are the most common way of limiting access to computer terminals. This system has certain loopholes, however. Access control software that would close such loopholes restricts terminal users to only those files for which they are authorized. Security consultants report that computer programs typically do not have audit controls that will allow the computer to isolate frauds automatically. A host of checks can be added to determine the reasonableness and consistency of any instructions being fed to a computer. Audit software is also a development which properly trained accountants can use to detect computer fraud. Also, most computer makers are now working to increase the present low level of security built into most operating systems. Tables are provided.

Downloads

No download available

Availability