Computer crime: As computer literacy increases, can the corporate database ever be safe?
Article Abstract:
Computer systems security cannot be achieved by purely technological solutions. Computer security is more than merely adapting to changes in computer technology and hacking techniques; computer security should be seen as the protection of assets (information). When systems protection is seen in this light, security becomes a matter of reducing the risk exposure of assets. Translated into a plan of action, this means that all computer operations should have a backup capability to recover lost or damaged assets, sensitive information should not be left in vulnerable areas (on central computers or telephone transmission lines), and hard copies of sensitive information should be subject to the same restrictions as the on-line data. Computer departments should have written policies that establish strict access and accountability controls.
Publication Name: FE: the Magazine for Financial Executives
Subject: Business
ISSN: 0883-7481
Year: 1986
User Contributions:
Comment about this article or add new information about this topic:
Security strategy: how companies can evaluate their future security needs
Article Abstract:
In order to select the appropriate computer security devices, the security needs of the organization must be assessed. The needs assessment should establish the monetary value of the data, the probability of loss, the acceptable levels of loss and risk exposure, the cost effectiveness of current security measures, and the individuals responsible for computer security. Strategies to protect information on floppy disks include classifying data according to importance and sensitivity, and establishing backup and encryption procedures. Passwords should be changed periodically, and should not be obvious or openly displayed. Computer equipment should be kept in a sealed off area, and employees should be carefully screened before they are given access to the organization's computers.
Publication Name: FE: the Magazine for Financial Executives
Subject: Business
ISSN: 0883-7481
Year: 1986
User Contributions:
Comment about this article or add new information about this topic:
Data security: reducing the risks
Article Abstract:
The major risks to computer system security are fraud, sabotage, access to or disclosure of files, and human error. The most commonly used techniques of computer fraud include: hacking, the use of phone lines to gain access to computers; terminal emulation programs or 'trojan horse' programs that fool users into giving the system their password; and the use of utility programs to access data on computer files. Management can minimize these risks by assuming responsibility for computer security, identifying the specific risks to which the system is vulnerable, establishing explicit security procedures for computer personnel, and monitoring data controls on an on-going basis.
Publication Name: The Accountant's Magazine
Subject: Business
ISSN: 0001-4761
Year: 1987
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Compumatic: a company behind the front line... Compumatic hits the bulls-eye. Smint's Summer heats up
- Abstracts: Personal computers attracting an ever-increasing share of professional tax return preparers. Computerized batch and on-line processors continue to upgrade services for practitioners
- Abstracts: Personal computers attracting an ever-increasing share of professional tax return preparers. part 2 Enhanced scrutiny affects more return preparers and increases costs of violations