NCJ Number
14113
Date Published
1974
Length
59 pages
Annotation
COLLECTION OF ARTICLES ON THE WAYS SECURITY PERSONNEL CAN PROTECT COMPUTER FACILITIES FROM ACCIDENTAL AND DELIBERATE HARM.
Abstract
SEVERAL ARTICLES NOTE THE PHYSICAL ASPECTS OF SECURITY LOCATION, ALARMS, FIRE PROTECTION, AND THE USE OF GUARDS. THE PERSONNEL ASPECTS OF SECURITY ARE ALSO DISCUSSED, WITH PARTICULAR ATTENTION TO THE KINDS OF PEOPLE WHO ARE THE GREATEST THREATS TO HARDWARE AND PROGRAM INTEGRITY. VARIOUS PROTECTIVE MECHANISMS ARE EXAMINED. THESE INCLUDE ACCESS CODES, DUPLICATE DATA BASES, ALARMS FOR UNAUTHORIZED USE, AND CODED DATA TRANSMISSIONS. THE SECURITY PROBLEMS PRESENTED BY TIME-SHARING SET-UPS ARE REVIEWED AND THE NECESSITY OF KEEPING IN MIND THE RELATIVE COSTS OF 'COMPLETE' SECURITY IS STRESSED. ONE ARTICLE DISCUSSES THE POSSIBILITIES FOR EMBEZZLEMENT BY COMPUTER AND ANOTHER RELATES THE CASE HISTORY OF A CALIFORNIA THEFT BY ONE COMPUTER FROM ANOTHER. A BRIEF SECURITY CHECKLIST IS PROVIDED FOR AN EFFECTIVE PROGRAM OF LOSS PREVENTION IN AND AROUND THE COMPUTER. (SNI ABSTRACT)