DocumentCode :
1333516
Title :
Is your computer insecure?
Author :
Beardsley, Charles W.
Volume :
9
Issue :
1
fYear :
1972
Firstpage :
67
Lastpage :
78
Abstract :
Sleepless nights face the data-processing manager who attempts to identify the many destructive fates that can await his computer center: fraud, hardware and software failures, operator errors, input errors, programming errors, magnetic erasure, electromagnetic and acoustic monitoring . . . Hardware and software techniques to prevent such disasters as leakage of private information, penetration of a computerized information center, and the alteration or destruction of a data base are surveyed in this article. Areas of concern include remote-terminal access, cryptography, the communication subsystem, threat monitoring, processing controls, certification, and the internal audit.
Keywords :
Communication system control; Computer crime; Computer errors; Computerized monitoring; Condition monitoring; Cryptography; Disaster management; Hardware; Process control; Remote monitoring;
fLanguage :
English
Journal_Title :
Spectrum, IEEE
Publisher :
ieee
ISSN :
0018-9235
Type :
jour
DOI :
10.1109/MSPEC.1972.5218476
Filename :
5218476
Link To Document :
بازگشت