U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Are Your Computers Protected?

NCJ Number
182106
Journal
Law Enforcement Technology Volume: 27 Issue: 4 Dated: April 2000 Pages: 18-22
Author(s)
Sergio D. Kopolev
Editor(s)
Ronnie Paynter
Date Published
April 2000
Length
4 pages
Annotation
Police computer systems need to be protected from crime by user authentication, intrusion-misuse detection systems, and effective auditing capabilities.
Abstract
Because a computer system must be accessible to authorized users, it must have portals of accessibility, and it is through these portals that the computer system becomes vulnerable to intrusion. Computer security is further complicated by the fact that only a fraction of the threat comes from outside the system. The approach to securing a computer system needs to be multi-faceted, one that has a competent authentication system for secured access, has an intrusion detection system to monitor system activities, and incorporates effective auditing procedures to assess the extent of a security breach and collect appropriate evidence. Products on the market to protect computer systems are briefly described, and the importance of proactive computer system protection is emphasized. 4 illustrations