U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

ANALYTICAL APPROACH TO IDENTIFYING COMPUTER VULNERABILITY

NCJ Number
13690
Journal
Security Management Volume: 18 Issue: 2 Dated: (MAY 1974) Pages: 6,8-11
Author(s)
L L BAIRD
Date Published
1974
Length
5 pages
Annotation
A METHOD OF BRINGING TOGETHER THE MULTITUDE OF TALENTS REQUIRED TO DEFINE, IDENTIFY, AND ISOLATE THE SPECIFIC THREATS TO COMPUTING SYSTEMS.
Abstract
A SYSTEMS ANALYSIS APPROACH TO IDENTIFYING ASSET VALUE, DATA CRITICALITY, SYSTEMS SECURITY, THREAT LEVEL, AND VULNERABILITY BY A COMPUTER SECURITY GROUP OFFERS A COST EFFECTIVE METHOD OF ASSESSING THE INTEGRITY OF A COMPUTING SYSTEM AND ITS FACILITIES. (AUTHOR ABSTRACT)