U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

TECHNIQUES FOR SECURITY AND PRIVACY IN COMPUTER SYSTEMS

NCJ Number
58494
Author(s)
L J HOFFMAN; G HEUGA
Date Published
1977
Length
0 pages
Annotation
THIS VIDEO CASSETTE HAS EXCERPTS FROM A THREE-CASSETTE SERIES WHICH ADVOCATES PROTECTING COMPUTER-STORED DATA AGAINST ACCIDENTAL OR INTENTIONAL DESTRUCTION, DISCLOSURE, OR MODIFICATION.
Abstract
THE TECHNOLOGICAL SAFEGUARDS THAT CAN BE APPLIED TO COMPUTER SOFTWARE AND HARDWARE ARE PRESENTED FOR STUDENTS AND PRACTICING PROFESSIONALS IN COMPUTER SCIENCE AND DATA PROCESSING. UNDER THE TOPIC OF AUTHENTICATION METHODS IN COMPUTER SYSTEMS, METHODS ARE EXAMINED FOR VERIFYING THE IDENTITIES OF SYSTEMS' USERS. THE MORE COMPLEX METHODS ARE MORE SECURE, BUT ARE CONCURRENTLY MORE COSTLY TO INSTALL, MORE TIME-CONSUMING TO USE, AND ARE FRUSTRATING FOR USERS. PROCEDURES SUCH AS THE SIMPLE PASSWORD AND THE SELECTED CHARACTER METHOD MAY BE PREFERRED FOR ALL BUT THE MOST RESTRICTED INFORMATION. PROCEDURES FOR AUTHORIZATION AND LOGGING IN COMPUTER SYSTEMS ARE DISCUSSED WITH EMPHASIS ON METHODS OF DETERMINING WHETHER A USER IS AUTHORIZED ACCESS TO A GIVEN DATA SOURCE. RESTRICTIONS ON THE LANGUAGES AVAILABLE TO USERS, AND THE USE OF AUTOMATIC REQUEST MODIFICATION ARE CONSIDERED ADVANTAGEOUS. A LOG OF ALL ACCESSES TO SENSITIVE DATA IS CONSIDERED ESSENTIAL TO THE DETERRING AND DISCOVERY OF UNAUTHORIZED USE OF THE COMPUTER. ADDITIONAL DISCUSSION CONCERNS PRIVACY TRANSFORMATIONS AND MODERN ENCRYPTION TECHNIQUES. CRYTOGRAPHY IS CONSIDERED USEFUL IN SYSTEMS WHICH LACK SECURE COMMUNICATION LINES. THE SELECTION OF PSEUDORANDOM NUMBER GENERATORS IS ALSO DISCUSSED. (TWK)