NCJ Number
28682
Journal
Assets Protection Volume: 1 Issue: 1 Dated: (SPRING 1975) Pages: 41-47
Date Published
1975
Length
7 pages
Annotation
THIS ARTICLE DISCUSSES METHODS OF VIOLATING COMPUTER SECURITY FOR THE PURPOSE OF INDUSTRIAL ESPIONAGE, TYPES OF DATA THAT ARE VULNERABLE, AND PRINCIPAL METHODS OF SAFEGUARDING COMPUTER INFORMATION.
Abstract
IT IS NOTED THAT THE MOST VULNERABLE TYPES OF DATA ARE INFORMATION ON POTENTIAL AND ACTUAL CUSTOMERS, AND THE COMPUTER PROGRAMS THEMSELVES. METHODS OF VIOLATING COMPUTER SECURITY INCLUDES COPING COMPUTER TAPES, REMOVAL OF MICROFILM OR MICROFICHE INFORMATION, USE OF REMOTE TERMINALS, AND TIME SHARING INTERVENTION THROUGH TELEPHONE LINES. PROTECTIVE MEASURES SUCH AS AREA ACCESS CONTROLS, PERSONNEL SECURITY, SEPARATION OF DUTIES, CONTROL OF COPIES, TRANSMISSION CONTROLS, AND USE OF CODES ARE DISCUSSED. THE USE OF COMPUTER SECURITY ADVISORY SERVICES IS ALSO EXPLAINED.