U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

COMPUTER AS A TARGET FOR THE INDUSTRIAL SPY

NCJ Number
28682
Journal
Assets Protection Volume: 1 Issue: 1 Dated: (SPRING 1975) Pages: 41-47
Author(s)
D B HOYT
Date Published
1975
Length
7 pages
Annotation
THIS ARTICLE DISCUSSES METHODS OF VIOLATING COMPUTER SECURITY FOR THE PURPOSE OF INDUSTRIAL ESPIONAGE, TYPES OF DATA THAT ARE VULNERABLE, AND PRINCIPAL METHODS OF SAFEGUARDING COMPUTER INFORMATION.
Abstract
IT IS NOTED THAT THE MOST VULNERABLE TYPES OF DATA ARE INFORMATION ON POTENTIAL AND ACTUAL CUSTOMERS, AND THE COMPUTER PROGRAMS THEMSELVES. METHODS OF VIOLATING COMPUTER SECURITY INCLUDES COPING COMPUTER TAPES, REMOVAL OF MICROFILM OR MICROFICHE INFORMATION, USE OF REMOTE TERMINALS, AND TIME SHARING INTERVENTION THROUGH TELEPHONE LINES. PROTECTIVE MEASURES SUCH AS AREA ACCESS CONTROLS, PERSONNEL SECURITY, SEPARATION OF DUTIES, CONTROL OF COPIES, TRANSMISSION CONTROLS, AND USE OF CODES ARE DISCUSSED. THE USE OF COMPUTER SECURITY ADVISORY SERVICES IS ALSO EXPLAINED.

Downloads

No download available

Availability