The document also includes a discussion of the legal implications associated with computer security failure and an analysis of the legal issues relating to proprietary interests in computer programs. A discussion of the development of computer usage is also included. Appendixes present case studies in selection and approval of controls and the baseline review method. (Author abstract modified)
Computer Crime - Computer Security Techniques
NCJ Number
84049
Date Published
1982
Length
217 pages
Annotation
This document describes and analyzes techniques to ensure security of computer facilities and data in differing environments. The document reflects findings of onsite visits to organizations representing the public, private, commercial and academic community. Over eighty techniques are described in general terms and are classified in terms of costs, users, and objectives.
Abstract