The Military is Concerned with Security Features when Making PC Purchases
Article Abstract:
Before jointly purchasing over ten thousand personal computers, the U.S. Army, Navy and Marine Corps looked for a machine that was ergonomically designed with a tilt and swivel monitor and featured the complete integration of hardware, software, and peripherals. Security requirements to meet the government's 'tempest' security specifications were included in the machine's design. Removable hard disks will enable users to purge and store information from the computer when it is not in use. Zenith Data Systems was awarded the contract for the high security microcomputers - sixteen-bit Zenith Z-150 personal computers that were selected as the preferred single-user, general-purpose, tempest computer system.
Publication Name: Office Administration and Automation
Subject: Computers and office automation industries
ISSN: 0745-4325
Year: 1985
User Contributions:
Comment about this article or add new information about this topic:
DOD 'Segmentation' Used as Security Device to Combat Unauthorized Access
Article Abstract:
The United States Department of Defense has separated its network into two systems to eliminate illegal accessing. Arpanet, developed in 1969, will become Milnet, a classified military network and R&Dnet, an unclassified network. Both DOD and NASA computers have been penetrated. Additional measures include more staff members in the Defense Department Security Institute, and proposed legislation providing stiff fines and prison terms for illegal system entry.
Publication Name: Office Administration and Automation
Subject: Computers and office automation industries
ISSN: 0745-4325
Year: 1983
User Contributions:
Comment about this article or add new information about this topic:
Federal Agencies Feel Awareness Is Necessary for Effective Security
Article Abstract:
Federal agencies are focusing on management awareness as the first step in protecting computer information. Management control over technical security systems is crucial. Areas to consider are protection of data; use of a risk-management approach when making decisions; and assignment of responsibilities to users. A guide outlining this approach is available from the U.S. government.
Publication Name: Office Administration and Automation
Subject: Computers and office automation industries
ISSN: 0745-4325
Year: 1985
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Towa designs POS cash register with enhanced functions for global sales. Programmable ECRs with IC memories streamline retail operations
- Abstracts: Minolta, Konica Partnership Takes Shape, Extends Beyond Toner
- Abstracts: Office Security. part 4
- Abstracts: Office Security
- Abstracts: Word Processing