U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Crime: The Extent, the Threat, Guarding Against It

NCJ Number
106486
Author(s)
P Poerting; E G Pott
Date Published
1986
Length
108 pages
Annotation
This report examines the nature, extent, and prevention of computer crime.
Abstract
The problem of unauthorized access and use (to steal or alter data, software, or hardware) is discussed; and four main areas of abuse are delineated: manipulation, spying, sabotage, and theft of online time. Strategies for prevention, structural considerations, personnel and organizational procedures, and EDP checks are reviewed. Possible prevention strategies are considered, including method of construction of the processor, the structure of the operating system, checks on the data base, and user supervision. The VMS system is analyzed, and it is concluded that systems using VAX processors fulfill all the criteria for operation within mid-level security requirements. This conclusion is substantiated by U.S. Department of Defense studies. Figures, tables, and 95 notes and references.