NCJ Number
73740
Journal
Security World Volume: 17 Issue: 9 Dated: (September 1980) Pages: 32-34
Date Published
1980
Length
3 pages
Annotation
This article explains the concept of security software, how and why it evolved, and some guidelines for evaluating particular software systems.
Abstract
In addition to controlling access to data, it is also necessary to control access to computer resources, the components and control programs that enable the computer to process data. Security software can protect data from destruction or alteration and can prevent the disclosure of sensitive information such as medical records, payroll data, or business plans. Studies have shown that 50 percent of all data losses result from mistakes such as accidentally scratching files and updating the wrong records. In addition, recent legislation has made companies responsible for ensuring the accuracy and privacy of personal records. Software must record, detect, and prevent attempts to access protected information by establishing identification procedures, notifying security personnel when a person's authorization criteria do not match the criteria needed to gain access, and by recording all access attempts. In addition, the software should allow authorized personnel easy access to needed data and add minimum processing overhead. A chart is included.