U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computers: Crimes, Clues and Controls -- A Management Guide

NCJ Number
108970
Date Published
1986
Length
39 pages
Annotation
This booklet instructs Federal managers in preventing unauthorized access, disclosure, delay, alteration, destruction, or other misuse of automated, unclassified sensitive data.
Abstract
Signs and control of computer crimes, abuses, and waste focus on information security, physical security, and personnel security. Information security pertains to the confidentiality, integrity, and availability of information and the accountability of the related information processes. After describing common techniques for committing computer-related fraud and abuse, clues that can indicate information security vulnerabilities are listed, followed by suggestions for information security controls. Physical security is concerned with controls that protect against natural disasters, intruders or vandals, environmental hazards, and accidents. Clues that indicate physical security vulnerabilities are listed, and suggestions for physical security controls are offered. The primary purpose of personnel security is to establish and maintain an ethical, technically proficient, informed, and trusted workforce. After citing examples of personnel computer crimes, abuses, and waste, clues that indicate personnel security vulnerabilities are described, followed by a listing of personnel security controls. The booklet concludes with an overall framework for developing security measures for a particular situation. Federal sources of assistance for computer security are listed.