NCJ Number
45539
Date Published
1974
Length
17 pages
Annotation
THE VARIOUS USES OF COMPUTERS IN COMMITTING MANY TYPES OF CRIMES IS EXAMINED, ALONG WITH EFFORTS AT IMPROVING COMPUTER SYSTEM SECURITY.
Abstract
THE INVOLVEMENT OF COMPUTERS IN CRIMINAL ACTS CAN TAKE THE FORM OF THEFT OF PRIVATE DATA IN STORAGE, THE CHANGING OR MANIPULATING OF STORED DATA, OR THE USE OF THE COMPUTER AS A TOOL OR ACCESSORY IN THE COMMISSION OF A CRIME. IN THE LATTER CASE THE COMPUTER IS USED AS A STORAGE OR OUTPUT MEDIUM FOR CRIMINALLY MANIPULATED INFORMATION THAT HAS ESCAPED THE DATA CHECKING AND AUDITING PROCEDURES THAT ARE PART OF THE SYSTEM. THE PAPER DESCRIBES TYPES OF COMPUTER-RELATED CRIMES THAT HAVE BEEN DISCOVERED. IT FOCUSES PARTICULARLY ON SUBVERSION OF A COMPUTER'S OPERATING SYSTEM, I.E., THAT SET OF PROGRAMS THAT CONTROL THE ALLOCATION OF A COMPUTER'S RESOURCES FOR THE EXECUTION OF THE VARIOUS PROBLEMS THAT THE COMPUTER MUST SOLVE. A TYPICAL CASE HISTORY OF COMPUTER CRIME IS EXAMINED IN DETAIL. THE ACTIVITIES OF THE RESEARCH IN SECURED OPERATING SYSTEMS PROJECT, A GROUP INVESTIGATING THE PROBLEM OF OPERATING SYSTEM SECURITY, IS DESCRIBED. THE PROJECT IS DEVELOPING A VARIETY OF COMPUTER-ASSISTED TOOLS AND METHODS FOR THE TESTING AND EVALUATION OF SOFTWARE SECURITY. (AUTHOR ABSTRACT MODIFIED -- VA)