NCJ Number
58494
Date Published
1977
Length
0 pages
Annotation
THIS VIDEO CASSETTE HAS EXCERPTS FROM A THREE-CASSETTE SERIES WHICH ADVOCATES PROTECTING COMPUTER-STORED DATA AGAINST ACCIDENTAL OR INTENTIONAL DESTRUCTION, DISCLOSURE, OR MODIFICATION.
Abstract
THE TECHNOLOGICAL SAFEGUARDS THAT CAN BE APPLIED TO COMPUTER SOFTWARE AND HARDWARE ARE PRESENTED FOR STUDENTS AND PRACTICING PROFESSIONALS IN COMPUTER SCIENCE AND DATA PROCESSING. UNDER THE TOPIC OF AUTHENTICATION METHODS IN COMPUTER SYSTEMS, METHODS ARE EXAMINED FOR VERIFYING THE IDENTITIES OF SYSTEMS' USERS. THE MORE COMPLEX METHODS ARE MORE SECURE, BUT ARE CONCURRENTLY MORE COSTLY TO INSTALL, MORE TIME-CONSUMING TO USE, AND ARE FRUSTRATING FOR USERS. PROCEDURES SUCH AS THE SIMPLE PASSWORD AND THE SELECTED CHARACTER METHOD MAY BE PREFERRED FOR ALL BUT THE MOST RESTRICTED INFORMATION. PROCEDURES FOR AUTHORIZATION AND LOGGING IN COMPUTER SYSTEMS ARE DISCUSSED WITH EMPHASIS ON METHODS OF DETERMINING WHETHER A USER IS AUTHORIZED ACCESS TO A GIVEN DATA SOURCE. RESTRICTIONS ON THE LANGUAGES AVAILABLE TO USERS, AND THE USE OF AUTOMATIC REQUEST MODIFICATION ARE CONSIDERED ADVANTAGEOUS. A LOG OF ALL ACCESSES TO SENSITIVE DATA IS CONSIDERED ESSENTIAL TO THE DETERRING AND DISCOVERY OF UNAUTHORIZED USE OF THE COMPUTER. ADDITIONAL DISCUSSION CONCERNS PRIVACY TRANSFORMATIONS AND MODERN ENCRYPTION TECHNIQUES. CRYTOGRAPHY IS CONSIDERED USEFUL IN SYSTEMS WHICH LACK SECURE COMMUNICATION LINES. THE SELECTION OF PSEUDORANDOM NUMBER GENERATORS IS ALSO DISCUSSED. (TWK)