U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Keeping Hackers at Bay

NCJ Number
100980
Journal
Telecommunication Technology Volume: 4 Issue: 2 Dated: (February 1986) Pages: 46-48,50,52
Author(s)
P C Waal
Date Published
1986
Length
5 pages
Annotation
Computer network security involves education, legislation, deterrence and technology.
Abstract
Education for both users and management should focus on computer ethics and data security policies. In the area of legislation, State laws resemble features of the Model Computer Crime Bill, especially regarding definitions of computer data and software as property and the specification of 'computer trespass' as a crime. Federal legislative initiatives are protecting more and more interstate computer systems. Deterrence should focus on tailoring penalties to computer crime severity, with some penalty imposed for even minor offenses. Technology should address network access security and interception security. Encryption/decryption are generally effective in providing interception security, but network access security is complicated by the anonymity afforded by the public telephone network and the nearly total reliance of computer systems on static passwords. A security strategy should be based in a heavily publicized data security policy, pre-employment security background checks, and the compartmentalization of employees' responsibilities. Managers must also keep updated on computer security technology.