U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

HACKER FOR HIRE

NCJ Number
146524
Journal
Computer Security Journal Volume: 8 Issue: 2 Dated: (Fall 1992) Pages: 61- 77
Author(s)
P Goldis
Date Published
1992
Length
17 pages
Annotation
Corporations must revise their views of how to prevent improper access to their mainframe computer systems and recognize that current and former employees pose more of a risk than true outsiders.
Abstract
They must also recognize that the nature of the software in use makes it susceptible to a variety of problems. Computer viruses are the least important of these problems. As corporations strive towards universal connectivity and try to leverage their investment in technology by allowing all types of computers to obtain access to all the corporate data, they must change their methods of preventing improper access. Resource security, sign-on security, and dial-up security are equally important, but the emphasis on each may vary within an organization. The author worked as a computer programmer and demonstrated many times to his employer how security could be compromised despite the elaborate and expensive measures in place.