home *** CD-ROM | disk | FTP | other *** search
/ Hackers Underworld 2: Forbidden Knowledge / Hackers Underworld 2: Forbidden Knowledge.iso / LEGAL / ARTICLES.TXT < prev    next >
Text File  |  1994-07-17  |  146KB  |  2,574 lines

  1.  
  2.            BIBLIOGRAPHY OF COMPUTER SECURITY ARTICLES 
  3.                         1983 THROUGH 1988
  4.  
  5. (Note:  A bibliograpghy is now being developed to encompass
  6. 1989.) 
  7.  
  8.                         AUTHORS SPECIFIED
  9.  
  10.                        ABUSE/MISUSE/CRIME
  11.  
  12.                                                              
  13.           AUTHOR:   Associated Press                          
  14.                                                              
  15.           TITLE OF ARTICLE:  Jury Selection In 1st "Virus"    
  16.                             Trial Begins                     
  17.                                                              
  18.           NAME OF PERIODICAL:  Washington Post                
  19.                                                              
  20.           VOLUME OF PERIODICAL:                               
  21.           NUMBER OF PERIODICAL:   277                         
  22.           ISSUE DATE:  September 7, 1988                      
  23.           PAGE NUMBER(S):  C1                                 
  24.           CATEGORY:  Abuse/Misuse/Crime                       
  25.           DESCRIPTION:  This article is about a programmer    
  26.          accused of using a computer "virus" to sabotage     
  27.          thousands of records at his former work place.      
  28.  
  29.                                                         
  30.           AUTHOR:  Atkinson, L.V.                             
  31.                                                              
  32.           TITLE OF ARTICLE:  Fraud:  Input Data Most          
  33.                             Vulnerable                       
  34.                                                              
  35.           NAME OF PERIODICAL:  Computerworld UK               
  36.                                                            
  37.           VOLUME OF PERIODICAL:  2                            
  38.           NUMBER OF PERIODICAL:  21                           
  39.           ISSUE DATE:  September 2, 1981                      
  40.           PAGE NUMBER(S):  10                                 
  41.           CATEGORY:  Abuse/Misuse/Crime       
  42.          DESCRIPTION:  Article discusses a survey which        
  43.          found that the major danger to computers was the    
  44.          alteration of input data.                           
  45.  
  46.                                                          
  47.           AUTHOR:  Baker, R.H.                                
  48.                                                              
  49.           TITLE OF ARTICLE:  Lining Up Computer Crooks        
  50.                                                              
  51.           NAME OF PERIODICAL:  Micro Communications           
  52.                                                              
  53.           VOLUME OF PERIODICAL: 2                             
  54.           NUMBER OF PERIODICAL: 5                             
  55.           ISSUE DATE:  May 1985                               
  56.           PAGE NUMBER(S):  18-22                              
  57.           CATEGORY:  Abuse/Misuse/Crime
  58.           DESCRIPTION:  This article looks at crime patterns  
  59.          of microcomputer users breaking into mainframes.    
  60.          Ways in which these patterns can be learned and then
  61.          stopped is discussed.                               
  62.  
  63.                                                            
  64.           AUTHOR:  Bequai, A.                                 
  65.                                                              
  66.           TITLE OF ARTICLE:  What to do About Crime in the    
  67.                             Electronic Office                
  68.                                                              
  69.           NAME OF PERIODICAL:  Office                         
  70.                                                              
  71.           VOLUME OF PERIODICAL:  101                          
  72.           NUMBER OF PERIODICAL:   1                           
  73.           ISSUE DATE:  January 1985                           
  74.           PAGE NUMBER(S):  101-104                            
  75.           CATEGORY:  Abuse/Misuse/Crime                       
  76.           DESCRIPTION:  This article discusses the important  
  77.          role that auditing computer systems plays in        
  78.          preventing crimes and abuse.                        
  79.  
  80.  
  81.           AUTHOR:  Betts, M.                                  
  82.                                                              
  83.           TITLE OF ARTICLE:  Government's Computers           
  84.                             "Highly Vulnerable" to Abuse     
  85.                                                              
  86.           NAME OF PERIODICAL:  Computerworld                  
  87.                                                              
  88.           VOLUME OF PERIODICAL:  18                           
  89.           NUMBER OF PERIODICAL:  40                           
  90.           ISSUE DATE:  October 1984                           
  91.           PAGE NUMBER(S):  4                                  
  92.           CATEGORY:  Abuse/Misuse/Crime                       
  93.           DESCRIPTION: Discusses how highly vulnerable the    
  94.          federal government's computers are to abuse, and a  
  95.          congressman who is seeking to change that           
  96.          vulnerability.                                      
  97.  
  98.                                                              
  99.           AUTHOR:  Blakeney, S.                               
  100.                                                              
  101.           TITLE OF ARTICLE: Computer Crime:  A Worldwide      
  102.                            Concern                           
  103.                                                              
  104.           NAME OF PERIODICAL:  Computerworld                  
  105.                                                              
  106.           VOLUME OF PERIODICAL:  17, 18                       
  107.           NUMBER OF PERIODICAL:  52, 1                        
  108.           ISSUE DATE:  December 26, 1983, January 1984        
  109.           PAGE NUMBER(S): 57-60                               
  110.           CATEGORY:  Abuse/Misuse/Crime                          
  111.           DESCRIPTION:  This article looks at computer crime  
  112.          as a worldwide problem. The most common types of    
  113.          computer crimes are given along with the estimated  
  114.          losses in various countries throughout the world.   
  115.  
  116.                                                              
  117.           AUTHOR:   Bologna, Jack                             
  118.                                                              
  119.           TITLE OF ARTICLE:  Computer Related Crime: The Who, 
  120.                             What, Where, When, Why and How   
  121.                                                              
  122.           NAME OF PERIODICAL:  Data Processing &              
  123.                               Communications Security        
  124.           VOLUME OF PERIODICAL:  10                           
  125.           NUMBER OF PERIODICAL:   1                           
  126.           ISSUE DATE:  Winter 1986                            
  127.           PAGE NUMBER(S):  19-23                              
  128.           CATEGORY:  Abuse/Misuse/Crime                       
  129.          DESCRIPTION: This article looks at computer related 
  130.          crime from the perspectives of the individual       
  131.          criminal, environmental factors, organization       
  132.          cultures, incidence rate, and security              
  133.          countermeasures.                                    
  134.  
  135.                                                              
  136.           AUTHOR:  Bramer, W.L.                               
  137.                                                              
  138.           TITLE OF ARTICLE:   Computer and Data Security is   
  139.                              Battle Cry to the '80s          
  140.                                                              
  141.           NAME OF PERIODICAL:  Office                         
  142.                                                              
  143.           VOLUME OF PERIODICAL:  103                          
  144.           NUMBER OF PERIODICAL:  3                            
  145.           ISSUE DATE:  March 1986                             
  146.           PAGE NUMBER(S):  78-82                              
  147.           CATEGORY:  Abuse/Misuse/Crime                       
  148.           DESCRIPTION: This article discusses the number of   
  149.          organizations that are looking at their security    
  150.          procedures and programs to deter computer abuse. The
  151.          three main causes of security problems are          
  152.          described.                                          
  153.  
  154.                                                              
  155.           AUTHOR:   Carey, Cameron                            
  156.                                                              
  157.           TITLE OF ARTICLE:   Data Access Control: Help or    
  158.                              Hindrance                       
  159.                                                              
  160.           NAME OF PERIODICAL:   Data Processing &             
  161.                                Communications Security       
  162.           VOLUME OF PERIODICAL: 11                            
  163.           NUMBER OF PERIODICAL:  4                            
  164.           ISSUE DATE:  Fall 1987                              
  165.           PAGE NUMBER(S):  18-20                              
  166.           CATEGORY: Access Control                            
  167.          DESCRIPTION: This article discusses limiting access 
  168.          to data and how to make access control protection   
  169.          more of a help than a hindrance by developing a set 
  170.          of priorities about various classes of data.        
  171.                                                              
  172.           AUTHOR:   Edwards, M.                               
  173.                                                              
  174.           TITLE OF ARTICLE:  The Sting in a Micro's Tail      
  175.                                                              
  176.                                                              
  177.           NAME OF PERIODICAL:  Practical Computing            
  178.                                                              
  179.           VOLUME OF PERIODICAL:  6                            
  180.           NUMBER OF PERIODICAL:  12                           
  181.           ISSUE DATE:  December 1983                          
  182.           PAGE NUMBER(S):  108-109                            
  183.           CATEGORY:  Abuse/Misuse/Crime                       
  184.           DESCRIPTION:  How criminals exploit information     
  185.          technology is described in this article along with  
  186.          ways to stop them.                                  
  187.  
  188.                                                              
  189.           AUTHOR:   Elmer-Dewitt, Phillip                     
  190.                                                              
  191.           TITLE OF ARTICLE: Invasion of the Data Snatchers!   
  192.                                                              
  193.           NAME OF PERIODICAL:  Time Magazine                  
  194.                                                              
  195.           VOLUME OF PERIODICAL:  123                          
  196.           NUMBER OF PERIODICAL:  13                           
  197.           ISSUE DATE:  September 26, 1988                     
  198.           PAGE NUMBER(S):  62-67                              
  199.           CATEGORY:  Abuse/Misuse/Crime                       
  200.          DESCRIPTION:  Discusses the current threat to       
  201.          computer systems posed by computer viruses. Computer
  202.          viruses are defined and several examples of viruses 
  203.          are given.                                          
  204.  
  205.                                                            
  206.           AUTHOR:  Johnson, B.                                
  207.                                                              
  208.           TITLE OF ARTICLE:  Criminal Minds Keep Pace with    
  209.                             Technology. Stop, Thief!         
  210.                                                              
  211.           NAME OF PERIODICAL:  Computerworld                  
  212.                                                              
  213.           VOLUME OF PERIODICAL:  15, 16                       
  214.           NUMBER OF PERIODICAL:  52, 1                        
  215.           ISSUE DATE:  December 28, 1981, January 4, 1982     
  216.           PAGE NUMBER(S):                                     
  217.           CATEGORY:  Abuse/Misuse/Crime                       
  218.           DESCRIPTION:  This article looks at some of the     
  219.          common problems that the DP industry faces today    
  220.          including computer security, asset protection, and  
  221.          computer fraud prevention.                          
  222.  
  223.                                                              
  224.           AUTHOR:   Kluepfel, Henry M.                        
  225.                                                              
  226.           TITLE OF ARTICLE:   Computer Security for the       
  227.                              Abuser Friendly Environment     
  228.                                                              
  229.           NAME OF PERIODICAL:  Data Processing &              
  230.                               Communications Security        
  231.           VOLUME OF PERIODICAL: 9                             
  232.           NUMBER OF PERIODICAL: 2                             
  233.           ISSUE DATE:  November/December 1984                 
  234.           PAGE NUMBER(S): 16-20                               
  235.           CATEGORY:  Abuse/Misuse/Crime                       
  236.          DESCRIPTION: This article discusses the underlying  
  237.          lack of adequate controls in computer systems and   
  238.          their relation to computer abuse and crime.         
  239.  
  240.                                                              
  241.           AUTHOR:  Kull, D.                                   
  242.                                                              
  243.           TITLE OF ARTICLE:  How to Make Even E.F. Hutton     
  244.                             Listen                           
  245.                                                              
  246.           NAME OF PERIODICAL:  Computer Decisions             
  247.                                                              
  248.           VOLUME OF PERIODICAL:  17                           
  249.           NUMBER OF PERIODICAL:  18                           
  250.           ISSUE DATE:  September 1985                         
  251.           PAGE NUMBER(S):  42-50                              
  252.           CATEGORY: Abuse/Misuse/Crime                        
  253.           DESCRIPTION: The most effective way for an          
  254.          organization to prevent breaches in a computer      
  255.          system is to plug the holes that have already been  
  256.          used to violate the system and identify the         
  257.          intruders.                                          
  258.  
  259.                                                              
  260.           AUTHOR:  Lasden, Martin                             
  261.                                                              
  262.           TITLE OF ARTICLE:  Computer Crime                   
  263.                                                              
  264.           NAME OF PERIODICAL:  Computer Decisions             
  265.                                                              
  266.           VOLUME OF PERIODICAL:                               
  267.           NUMBER OF PERIODICAL:                               
  268.           ISSUE DATE:  June 1981                              
  269.           PAGE NUMBER(S):  104-106, 108 112, 116, 118, 120,   
  270.                           122, 124                           
  271.           CATEGORY:   Abuse/Misuse/Crime                      
  272.           DESCRIPTION:  This article discusses actual computer
  273.          crimes that have taken place and the factors that   
  274.          escalate the risk of an organization from these     
  275.          types of crime.                                     
  276.  
  277.                                                             
  278.           AUTHOR:  Lucas, D.                                  
  279.                                                              
  280.           TITLE OF ARTICLE:  The Invisible Enemy              
  281.                                                              
  282.           NAME OF PERIODICAL:  Business Computing and         
  283.                               Communication                  
  284.           VOLUME OF PERIODICAL:                               
  285.           NUMBER OF PERIODICAL:                               
  286.           ISSUE DATE:  February 1985                          
  287.           PAGE NUMBER(S): 18-20                               
  288.           CATEGORY: Abuse/Misuse/Crime                        
  289.           DESCRIPTION: This article describes how home        
  290.          computer users are breaking into some of Britain's  
  291.          mainframe computers. Various procedures that can    
  292.          protect against intrusion are also discussed by the 
  293.          author.                                             
  294.                                                              
  295.           AUTHOR:  McKibbin, W.L.                             
  296.                                                              
  297.           TITLE OF ARTICLE:  Who Gets The Blame For Computer  
  298.                             Crime                            
  299.                                                              
  300.           NAME OF PERIODICAL:  Infosystems                    
  301.                                                              
  302.           VOLUME OF PERIODICAL: 30                            
  303.           NUMBER OF PERIODICAL:  7                            
  304.           ISSUE DATE:  July 1983                              
  305.           PAGE NUMBER(S):  34-36                              
  306.           CATEGORY:  Abuse/Misuse/Crime                       
  307.           DESCRIPTION: MIS managers are ultimately responsible
  308.          for the security of their computers. Since they are 
  309.          responsible they should make sure upper management  
  310.          is aware of the vulnerabilities of their computers. 
  311.  
  312.                                                              
  313.           AUTHOR:  Mylott, T.R.                               
  314.                                                              
  315.           TITLE OF ARTICLE:  Computer Security and the        
  316.                             Threats from Within              
  317.                                                              
  318.           NAME OF PERIODICAL:  Office                         
  319.                                                              
  320.           VOLUME OF PERIODICAL:   101                         
  321.           NUMBER OF PERIODICAL:   3                           
  322.           ISSUE DATE:  March 1985                             
  323.           PAGE NUMBER(S):   45-46, 190                        
  324.           CATEGORY:  Abuse/Misuse/Crime                       
  325.           DESCRIPTION: This article explains that the greatest
  326.          computer-related danger to a company may be from    
  327.          internal threats by employees.                      
  328.  
  329.                                                              
  330.           AUTHOR:   White, L.                                 
  331.                                                              
  332.           TITLE OF ARTICLE:  Data Security - You Can't        
  333.                             Work Without It                  
  334.                                                              
  335.           NAME OF PERIODICAL:  Computerworld                  
  336.                                                              
  337.           VOLUME OF PERIODICAL:  19                           
  338.           NUMBER OF PERIODICAL:  11A                          
  339.           ISSUE DATE: March 1985                              
  340.           PAGE NUMBER(S):  27-30                              
  341.           CATEGORY:  Abuse/Misuse/Crime                       
  342.           DESCRIPTION: The problem of the disgruntled employee
  343.          or ex-employee who sabotages a computer system is   
  344.          seen as more of a threat than an outside hacker.    
  345.  
  346.                                                              
  347.           AUTHOR:   Zalud, Bill                               
  348.                                                              
  349.           TITLE OF ARTICLE:  Security and DP Cooperate to     
  350.                             Attack Computer Crime            
  351.                                                              
  352.           NAME OF PERIODICAL:  Security                       
  353.                                                              
  354.           VOLUME OF PERIODICAL:   24                          
  355.           NUMBER OF PERIODICAL:   10                          
  356.           ISSUE DATE:   October 1987                          
  357.           PAGE NUMBER(S):  52-56, & 58                        
  358.           CATEGORY:   Abuse/Misuse/Crime                      
  359.          DESCRIPTION: This article stresses teamwork as      
  360.          computer crime becomes a company fact of life by    
  361.          effectively cuts across a number of functional      
  362.          areas.                                              
  363.  
  364.                        ACCESS CONTROL
  365.  
  366.                                                             
  367.           AUTHOR:  Avarne, Simon                              
  368.                                                              
  369.           TITLE OF ARTICLE:   How to Find Out a Password      
  370.                                                              
  371.           NAME OF PERIODICAL:   Data Processing &             
  372.                                Communications Security       
  373.           VOLUME OF PERIODICAL:  12                           
  374.           NUMBER OF PERIODICAL:   2                           
  375.           ISSUE DATE:  Spring 1988                            
  376.           PAGE NUMBER(S):   16-17                             
  377.           CATEGORY:  Access Control                           
  378.          DESCRIPTION:  This article gives examples of how to 
  379.          discover someones password and discusses weaknesses 
  380.          of traditional passwords.                           
  381.  
  382.                                                              
  383.           AUTHOR:  Betts, M.                                  
  384.                                                              
  385.           TITLE OF ARTICLE:  NBS Releases Standards For       
  386.                             Managing Password Security       
  387.                                                              
  388.           NAME OF PERIODICAL:  Computerworld                  
  389.                                                              
  390.           VOLUME OF PERIODICAL:   19                          
  391.           NUMBER OF PERIODICAL:   28                          
  392.           ISSUE DATE:  July 1985                              
  393.           PAGE NUMBER(S):  19                                 
  394.           CATEGORY:  Access Control                           
  395.                                  
  396.          DESCRIPTION:  This article talks about how the      
  397.          National Bureau of Standards has completed a two-   
  398.          part publication dealing with password systems.     
  399.  
  400.                                                              
  401.           AUTHOR:   Bowmen, Terry                             
  402.                                                              
  403.           TITLE OF ARTICLE:  Undercarpet Fiber Optics         
  404.                                                              
  405.                                                              
  406.           NAME OF PERIODICAL:  Data Processing &              
  407.                               Communications Security        
  408.           VOLUME OF PERIODICAL:  11                           
  409.           NUMBER OF PERIODICAL:   2                           
  410.           ISSUE DATE:  Spring 1987                            
  411.           PAGE NUMBER(S):  23-26                              
  412.           CATEGORY:  Access Control                           
  413.          DESCRIPTION: This article discusses how fiber optics
  414.          offer better security than copper cable undercarpet.
  415.          It also includes how to plan an undercarpet system. 
  416.  
  417.                                                              
  418.           AUTHOR:   Clyde, Allen R.                           
  419.                                                              
  420.           TITLE OF ARTICLE:  Insider Threat on Automated      
  421.                             Information Systems              
  422.                                                              
  423.           NAME OF PERIODICAL:   Data Processing &             
  424.                                Communications Security       
  425.           VOLUME OF PERIODICAL:  11                           
  426.           NUMBER OF PERIODICAL:   4                           
  427.           ISSUE DATE:  Fall 1987                              
  428.           PAGE NUMBER(S):  11-14                              
  429.           CATEGORY:  Access Control                           
  430.          DESCRIPTION:  This articles discusses activities to 
  431.          detect sources of abuse that are not widely         
  432.          implemented.                                        
  433.  
  434.  
  435.                                                              
  436.           AUTHOR: Davidson, Thomas L. and                     
  437.                  White, Clinton E. Jr.                       
  438.           TITLE OF ARTICLE:  How to Improve Network Security  
  439.                                                              
  440.           NAME OF PERIODICAL:  Infosystems                    
  441.                                                              
  442.           VOLUME OF PERIODICAL:  30                           
  443.           NUMBER OF PERIODICAL:  6                            
  444.           ISSUE DATE: June 1983                               
  445.           PAGE NUMBER(S):  110-112                            
  446.           CATEGORY:  Access Control                           
  447.                                  
  448.          DESCRIPTION: This article discusses the need to     
  449.          protect network systems using software locks,       
  450.          authorization schemes, logs, and data encryption.   
  451.  
  452.  
  453.                                                             
  454.           AUTHOR: Diamond, F.H.                               
  455.                                                              
  456.           TITLE OF ARTICLE: Computer Network Security:  The   
  457.                            Need Was Never Greater            
  458.                                                              
  459.           NAME OF PERIODICAL:   Office                        
  460.                                                              
  461.           VOLUME OF PERIODICAL:  102                          
  462.           NUMBER OF PERIODICAL:  2                            
  463.           ISSUE DATE:  August 1985                            
  464.           PAGE NUMBER(S):  94-99                              
  465.           CATEGORY:  Access Control                           
  466.                                  
  467.          DESCRIPTION: This article discusses the advantages  
  468.          of using the callback approach in computer networks 
  469.          to prevent hackers from getting onto a system.      
  470.  
  471.  
  472.                                                              
  473.           AUTHOR:  Fisher, M.J.                               
  474.                                                              
  475.           TITLE OF ARTICLE: New Security Device "Fingers"     
  476.                            Culprit                           
  477.                                                              
  478.           NAME OF PERIODICAL:   MIS Week                      
  479.                                                              
  480.           VOLUME OF PERIODICAL:  6                            
  481.           NUMBER OF PERIODICAL:  35                           
  482.           ISSUE DATE:  September 1985                         
  483.           PAGE NUMBER(S):   12                                
  484.           CATEGORY:   Access Control                          
  485.                                  
  486.          DESCRIPTION:  This article describes a new product  
  487.          that uses a fingerprint device to verify a user's   
  488.          identity and then allow access on the computer      
  489.          system.                                             
  490.  
  491.  
  492.                                                              
  493.           AUTHOR:  Horgan, J.                                 
  494.                                                              
  495.           TITLE OF ARTICLE:  Thwarting The Information Thiefs 
  496.                                                              
  497.           NAME OF PERIODICAL:  IEEE Spectrum                  
  498.                                                              
  499.           VOLUME OF PERIODICAL:  22                           
  500.           NUMBER OF PERIODICAL:  7                            
  501.           ISSUE DATE: July 1985                               
  502.           PAGE NUMBER(S):  30-41                              
  503.           CATEGORY:  Access Control                           
  504.                                  
  505.          DESCRIPTION:  Many organizations are protecting     
  506.          their communication output from electronic          
  507.          interception by trying to detect and foil the       
  508.          surveillance using a variety of methods.            
  509.  
  510.                                                             
  511.           AUTHOR:   Jackson, Carl B.                          
  512.                                                              
  513.           TITLE OF ARTICLE:  Passwords:  Comments from the    
  514.                             Information Systems Security     
  515.                             Association                      
  516.           NAME OF PERIODICAL:   Security                      
  517.                                                              
  518.           VOLUME OF PERIODICAL:  24                           
  519.           NUMBER OF PERIODICAL:   7                           
  520.           ISSUE DATE:  July 1987                              
  521.           PAGE NUMBER(S):  105                                
  522.           CATEGORY:   Access Control                          
  523.          DESCRIPTION: Discusses relevant security issues and 
  524.          how to bring an appropriate degree of LAN           
  525.          information security to your organization.          
  526.  
  527.  
  528.                                                              
  529.           AUTHOR:  Kontur, J.S. and Letham, L.                
  530.                                                              
  531.           TITLE OF ARTICLE:  Locking Up System Security       
  532.                                                              
  533.                                                              
  534.           NAME OF PERIODICAL:  Electronic Week                
  535.                                                              
  536.           VOLUME OF PERIODICAL:   58                          
  537.           NUMBER OF PERIODICAL:   7                           
  538.           ISSUE DATE:  February 18, 1985                      
  539.           PAGE NUMBER(S):  68-72                              
  540.           CATEGORY:   Access Control                          
  541.                                  
  542.          DESCRIPTION:  This article describes a system that  
  543.          cannot be broken into by unauthorized users. It uses
  544.          a random-number generator and encryption logic.     
  545.  
  546.  
  547.                                                              
  548.           AUTHOR:  Korzeniowski, P.                           
  549.                                                              
  550.           TITLE OF ARTICLE: Security Dynamics Releases Two-   
  551.                            Part Security System              
  552.                                                              
  553.           NAME OF PERIODICAL:   Computerworld                 
  554.                                                              
  555.           VOLUME OF PERIODICAL:  19                           
  556.           NUMBER OF PERIODICAL:  42                           
  557.           ISSUE DATE: October 1985                            
  558.           PAGE NUMBER(S):  19, 23                             
  559.           CATEGORY:  Access Control                           
  560.                                  
  561.          DESCRIPTION:  This article discusses a product      
  562.          Security Dynamics has designed that is an           
  563.          inexpensive security protection device which keeps  
  564.          hackers out of systems.                             
  565.  
  566.                                                             
  567.           AUTHOR:  McCarthy, Charles J.                       
  568.                                                              
  569.           TITLE OF ARTICLE:  Passwords                        
  570.                                                              
  571.           NAME OF PERIODICAL:  Data Processing &              
  572.                               Communications Security        
  573.           VOLUME OF PERIODICAL: 10                            
  574.           NUMBER OF PERIODICAL:  4                            
  575.           ISSUE DATE:  Fall 1986                              
  576.           PAGE NUMBER(S):  13-14                              
  577.           CATEGORY:  Access Control                           
  578.          DESCRIPTION:  This article discusses the two primary
  579.          password configurations passwords defined by user,  
  580.          and passwords assigned to a user. It shows the      
  581.          differences between these two from a security view. 
  582.  
  583.                                                              
  584.           AUTHOR:  Meason, Robert                             
  585.                                                              
  586.           TITLE OF ARTICLE:  System Security at the Terminal  
  587.                                                              
  588.                                                              
  589.           NAME OF PERIODICAL:  Data Processing &              
  590.                               Communications Security        
  591.           VOLUME OF PERIODICAL:  10                           
  592.           NUMBER OF PERIODICAL:   4                           
  593.           ISSUE DATE:  Fall 1986                              
  594.           PAGE NUMBER(S):  16-17                              
  595.           CATEGORY:   Access Control                          
  596.          DESCRIPTION: This article discusses considerations  
  597.          of MIS management protection of the processor from  
  598.          access by unauthorized users.                       
  599.  
  600.                                                              
  601.           AUTHOR:  Muzerall, Joseph V. and Carty, Thomas J.   
  602.                                                              
  603.           TITLE OF ARTICLE:   COMSEC and Its Need for Key     
  604.                              Management                      
  605.                                                              
  606.           NAME OF PERIODICAL:  Data Processing &              
  607.                               Communications Security        
  608.           VOLUME OF PERIODICAL: 11                            
  609.           NUMBER OF PERIODICAL:  2                            
  610.           ISSUE DATE:  Spring 1987                            
  611.           PAGE NUMBER(S):  11-14                              
  612.           CATEGORY:  Access Control                           
  613.          DESCRIPTION: This article explains the establishment
  614.          of a standard set of protection mechanisms for both 
  615.          the classified and private user communities.        
  616.  
  617.                                                              
  618.           AUTHOR:  Schiller, Michael                          
  619.                                                              
  620.           TITLE OF ARTICLE:  Security at the Touch of a       
  621.                             Finger                           
  622.                                                              
  623.           NAME OF PERIODICAL:  Data Processing &              
  624.                               Communications Security        
  625.           VOLUME OF PERIODICAL:  9                            
  626.           NUMBER OF PERIODICAL:  6                            
  627.           ISSUE DATE:  July/August 1985                       
  628.           PAGE NUMBER(S): 15-17                               
  629.           CATEGORY:  Access Control                           
  630.          DESCRIPTION:  This article discusses using biometric
  631.          security systems for high-tech solutions to access  
  632.          control problems.                                   
  633.  
  634.                                                              
  635.           AUTHOR:  Schmonsees, Robert J.                      
  636.                                                              
  637.           TITLE OF ARTICLE: Identification and Authentication:
  638.                            The Security Challenge of the 80's
  639.                                                              
  640.           NAME OF PERIODICAL:  Data Processing &              
  641.                               Communications Security        
  642.           VOLUME OF PERIODICAL:  9                            
  643.           NUMBER OF PERIODICAL:  4                            
  644.           ISSUE DATE: March/April, 1985                       
  645.           PAGE NUMBER(S):  22-23                              
  646.           CATEGORY:  Access Control                           
  647.          DESCRIPTION:  This article discusses the computer   
  648.          security issues of identification and authentication
  649.          showing the common problems and offering some       
  650.          suggestions for improving by random passcode.       
  651.  
  652.                                                              
  653.           AUTHOR:  Stieglitz, M.                              
  654.                                                              
  655.           TITLE OF ARTICLE:  Security For Shared Resources    
  656.                                                              
  657.           NAME OF PERIODICAL:  Micro Communications           
  658.                                                              
  659.           VOLUME OF PERIODICAL:  2                            
  660.           NUMBER OF PERIODICAL:  6                            
  661.           ISSUE DATE:  June 1985                              
  662.           PAGE NUMBER(S):  19-26                              
  663.           CATEGORY:  Access Control                           
  664.                                  
  665.          DESCRIPTION:  This article discusses data security  
  666.          products and procedures for network use. Includes   
  667.          description of encryption techniques that are now   
  668.          popular.                                            
  669.  
  670.  
  671.                                                              
  672.           AUTHOR:   Wood, Charles Cresson                     
  673.                                                              
  674.           TITLE OF ARTICLE:  A New Approach to Computer User  
  675.                             Authentication                   
  676.                                                              
  677.           NAME OF PERIODICAL:  Data Processing &              
  678.                               Communications Security        
  679.           VOLUME OF PERIODICAL:  10                           
  680.           NUMBER OF PERIODICAL:   4                           
  681.           ISSUE DATE:  Fall 1986                               
  682.           PAGE NUMBER(S):  21-26                              
  683.           CATEGORY:  Access Control                           
  684.          DESCRIPTION: This article gives a new approach to   
  685.          authentication called dial-guard. It addresses the  
  686.          two problems of password/users IDs not providing    
  687.          sufficient security and identifying the location of 
  688.          dial-up users.                                      
  689.  
  690.  
  691.                                                              
  692.           AUTHOR:   Wood, Charles Cresson                     
  693.                                                              
  694.           TITLE OF ARTICLE:  Information Security with        
  695.                             One-Way Functions                
  696.                                                              
  697.           NAME OF PERIODICAL:  Data Processing &              
  698.                               Communications Security        
  699.           VOLUME OF PERIODICAL:  9                            
  700.           NUMBER OF PERIODICAL:  5                            
  701.           ISSUE DATE: May/June 1985                           
  702.           PAGE NUMBER(S):  14-16                              
  703.           CATEGORY:  Access Control                           
  704.          DESCRIPTION:  This article explains how one-way     
  705.          functions can be used to safeguard information that 
  706.          is too sensitive to be protected via encryption.    
  707.  
  708.  
  709.                       AUDIT AND EVALUATION
  710.                                                              
  711.           AUTHOR:  Berman, A.                                 
  712.                                                              
  713.           TITLE OF ARTICLE:  Evaluating On-Line Computer      
  714.                             Security                         
  715.                                                              
  716.           NAME OF PERIODICAL:  Data Communications            
  717.                                                              
  718.           VOLUME OF PERIODICAL:   12                          
  719.           NUMBER OF PERIODICAL:    7                          
  720.           ISSUE DATE: July 1983                               
  721.           PAGE NUMBER(S):  145-152                            
  722.           CATEGORY:  Audit and Evaluation                     
  723.                                  
  724.          DESCRIPTION:  The security problems that have arisen
  725.          because of on-line processing are discussed in this 
  726.          article. Covered are the two ways to obtain a secure
  727.          on-line system.                                     
  728.  
  729.                                                           
  730.           AUTHOR:   Betts, M.                                 
  731.                                                              
  732.           TITLE OF ARTICLE:  U.S. Agency Faces Probes, Boosts 
  733.                             Security After Audit             
  734.                                                              
  735.           NAME OF PERIODICAL:  Computerworld                  
  736.                                                              
  737.           VOLUME OF PERIODICAL:  19                           
  738.           NUMBER OF PERIODICAL:  24                           
  739.           ISSUE DATE:  June 1985                              
  740.           PAGE NUMBER(S):  8                                  
  741.           CATEGORY:  Audit and Evaluation                     
  742.                                  
  743.          DESCRIPTION:  This article discusses an audit report
  744.          issued by the inspector general of the U.S.         
  745.          Department of the Interior in March 1985 which      
  746.          revealed inadequate controls over passwords, faulty 
  747.          operating procedures, and lack of audit trails by   
  748.          the Denver Service Center.                          
  749.  
  750.                                                        
  751.           AUTHOR:  Bologna, Jack                              
  752.                                                              
  753.           TITLE OF ARTICLE:  Forensic Accounting              
  754.                                                              
  755.           NAME OF PERIODICAL:  Data Processing &              
  756.                               Communications Security        
  757.           VOLUME OF PERIODICAL:  8                            
  758.           NUMBER OF PERIODICAL:  6                            
  759.           ISSUE DATE:  July/August 1984                       
  760.           PAGE NUMBER(S):  16-20                              
  761.           CATEGORY:  Audit and Evaluation                     
  762.          DESCRIPTION: This article identifies the skills and 
  763.          competency of a forensic accountant.                
  764.  
  765.                                                              
  766.           AUTHOR:  Flach, Joseph P.                           
  767.                                                              
  768.           TITLE OF ARTICLE: Increasing Programming Efficiency 
  769.                            While Preventing the "F" Word     
  770.                                                              
  771.           NAME OF PERIODICAL:   Data Processing &             
  772.                                Communications Security       
  773.           VOLUME OF PERIODICAL:  11                           
  774.           NUMBER OF PERIODICAL:   4                           
  775.           ISSUE DATE:  Fall 1987                              
  776.           PAGE NUMBER(S):   15-17                             
  777.           CATEGORY:  Audit and Evaluation                     
  778.          DESCRIPTION:  This article gives examples of ways   
  779.          to identify fraudulent code in a production program.
  780.  
  781.                                                              
  782.           AUTHOR:   Gaydasch, Alexander                       
  783.                                                              
  784.           TITLE OF ARTICLE:  Postimplementation Audits -      
  785.                             A Quick, Easy Approach           
  786.                                                              
  787.           NAME OF PERIODICAL:  Data Management                
  788.                                                              
  789.           VOLUME OF PERIODICAL:                               
  790.           NUMBER OF PERIODICAL:                               
  791.           ISSUE DATE:   February 1983                         
  792.           PAGE NUMBER(S):  54, 55, 69                         
  793.           CATEGORY:  Audit and Evaluation                     
  794.                                  
  795.          DESCRIPTION: This article describes post-           
  796.          implementation audits and how they help to determine
  797.          whether a computer system has met its original      
  798.          criteria.                                           
  799.  
  800.  
  801.  
  802.                       CONTINGENCY PLANNING
  803.  
  804.                                                             
  805.           AUTHOR:  Cabell, D.                                 
  806.                                                              
  807.           TITLE OF ARTICLE:  Network Backups                  
  808.                                                              
  809.           NAME OF PERIODICAL:  Micro Communications           
  810.                                                              
  811.           VOLUME OF PERIODICAL:  2                            
  812.           NUMBER OF PERIODICAL:  6                            
  813.           ISSUE DATE:  June 1985                              
  814.           PAGE NUMBER(S):  14-18                              
  815.           CATEGORY:  Contingency Planning                     
  816.                                  
  817.          DESCRIPTION: This article describes how the only way
  818.          to protect a LAN, micro, mini, or mainframe from a  
  819.          complete system crash is adequate backup.           
  820.  
  821.                                                              
  822.           AUTHOR:  Ciura, J.M.                                
  823.                                                              
  824.           TITLE OF ARTICLE:  Vital Records Protection:        
  825.                             Identifying Essential            
  826.                             Information                      
  827.           NAME OF PERIODICAL:  Information Management         
  828.                                                              
  829.           VOLUME OF PERIODICAL:   19                          
  830.           NUMBER OF PERIODICAL:   2                           
  831.           ISSUE DATE:  February 1985                          
  832.           PAGE NUMBER(S):  11                                 
  833.           CATEGORY:  Contingency Planning                     
  834.                                  
  835.          DESCRIPTION:  This article suggest that the best way
  836.          to resume business activity after an emergency or   
  837.          disaster is to have a vital records protection      
  838.          program.                                            
  839.  
  840.                                                              
  841.           AUTHOR:   Clauss, Karl H.                           
  842.                                                              
  843.           TITLE OF ARTICLE:  How To Move A Data Center and    
  844.                             Avoid a Disaster                 
  845.                                                              
  846.           NAME OF PERIODICAL:  Infosystems                    
  847.                                                              
  848.           VOLUME OF PERIODICAL:                               
  849.           NUMBER OF PERIODICAL:                               
  850.           ISSUE DATE:   December 1981                         
  851.           PAGE NUMBER(S):  46-48, 50                          
  852.           CATEGORY:   Contingency Planning                    
  853.                                  
  854.          DESCRIPTION:  This article describes how ARCO Oil   
  855.          and Gas Company moved their computer center to a new
  856.          location and the points a company should consider   
  857.          when moving a data center.                          
  858.  
  859.                                                            
  860.           AUTHOR:  Dobberstein, M.                            
  861.                                                              
  862.           TITLE OF ARTICLE:   To Have and Not to Have a       
  863.                              Disaster                        
  864.                                                              
  865.           NAME OF PERIODICAL:  Computer Decisions             
  866.                                                              
  867.           VOLUME OF PERIODICAL:  17                           
  868.           NUMBER OF PERIODICAL:  18                           
  869.           ISSUE DATE:  September 1985                         
  870.           PAGE NUMBER(S):  102-126                            
  871.           CATEGORY:  Contingency Planning                     
  872.                                  
  873.          DESCRIPTION:  This article deals with the importance
  874.          of actually testing contingency plans to see if they
  875.          work.                                               
  876.  
  877.                                                           
  878.           AUTHOR:  Minoli, D.                                 
  879.                                                              
  880.           TITLE OF ARTICLE:  Backup Needs Merit Special       
  881.                             Attention                        
  882.                                                              
  883.           NAME OF PERIODICAL:  Computerworld                  
  884.                                                              
  885.           VOLUME OF PERIODICAL:   19                          
  886.           NUMBER OF PERIODICAL:   15                          
  887.           ISSUE DATE:  April 1985                             
  888.           PAGE NUMBER(S):  91, 96                             
  889.           CATEGORY: Contingency Planning                      
  890.                                  
  891.          DESCRIPTION: This article focuses on the merits of  
  892.          backing up a data center to prevent a major disaster
  893.          from critically affecting a company.                
  894.  
  895.  
  896.                                                              
  897.           AUTHOR:  Pujals, J.M.                               
  898.                                                              
  899.           TITLE OF ARTICLE:   What is a Contingency Plan?     
  900.                                                              
  901.                                                              
  902.           NAME OF PERIODICAL:   Data Processing &             
  903.                                Communications Security       
  904.           VOLUME OF PERIODICAL:  12                           
  905.           NUMBER OF PERIODICAL:   1                           
  906.           ISSUE DATE: Winter 1988                             
  907.           PAGE NUMBER(S):  19-23                              
  908.           CATEGORY:   Contingency Planning                    
  909.          DESCRIPTION: This article tells how to construct  a 
  910.          contingency plan and goes over the major mandatory  
  911.          steps that have to be taken to end up with a        
  912.          workable product.                                   
  913.  
  914.                                                      
  915.           AUTHOR:  Raimondi, D.                               
  916.                                                              
  917.           TITLE OF ARTICLE:  E.F. Hutton Underscores          
  918.                             Practicality in Backup Plan      
  919.                                                              
  920.           NAME OF PERIODICAL:  Computerworld                  
  921.                                                              
  922.           VOLUME OF PERIODICAL:   19                          
  923.           NUMBER OF PERIODICAL:   15                          
  924.           ISSUE DATE:  April 1985                             
  925.           PAGE NUMBER(S):  19                                 
  926.           CATEGORY:  Contingency Planning                     
  927.                                  
  928.          DESCRIPTION:  Describes how E.F. Hutton has built a 
  929.          new computer room as part of its disaster recovery  
  930.          plan.                                               
  931.  
  932.                                                              
  933.           AUTHOR:  Rames, David                               
  934.                                                              
  935.           TITLE OF ARTICLE:   Recovering From Disasters       
  936.                                                              
  937.           NAME OF PERIODICAL:  Computer Decisions             
  938.                                                              
  939.           VOLUME OF PERIODICAL:                               
  940.           NUMBER OF PERIODICAL:                               
  941.           ISSUE DATE:  September 1981                         
  942.           PAGE NUMBER(S):  108-110, 112, 114, 120, 122, 124,  
  943.                           126-131, 188-189                   
  944.           CATEGORY:  Contingency Planning                     
  945.                                  
  946.          DESCRIPTION:  Described in this article are criteria
  947.          for developing an emergency backup plan and examples
  948.          of emergency backup alternatives.                   
  949.  
  950.  
  951.                                                              
  952.           AUTHOR:  Scoma, Louis                               
  953.                                                              
  954.           TITLE OF ARTICLE:  How Secure Is Your Computer      
  955.                             Operation From A Disaster        
  956.                                                              
  957.           NAME OF PERIODICAL:  Office                         
  958.                                                              
  959.           VOLUME OF PERIODICAL:                               
  960.           NUMBER OF PERIODICAL:                               
  961.           ISSUE DATE:  August 1981                            
  962.           PAGE NUMBER(S):  96, 98                             
  963.           CATEGORY:  Contingency Planning                     
  964.                                  
  965.          DESCRIPTION:  The failures of companies to protect  
  966.          their computer centers is discussed along with the  
  967.          need for recovery systems to serve as backup        
  968.          security.                                           
  969.  
  970.  
  971.                                                              
  972.           AUTHOR:  Wolbrecht, J.E.                            
  973.                                                              
  974.           TITLE OF ARTICLE:  Can Your Records Storage Center  
  975.                             Stand a Disaster                 
  976.                                                              
  977.           NAME OF PERIODICAL:  Office                         
  978.                                                              
  979.           VOLUME OF PERIODICAL:   102                         
  980.           NUMBER OF PERIODICAL:     3                         
  981.           ISSUE DATE:   September 1985                        
  982.           PAGE NUMBER(S):  112-113                            
  983.           CATEGORY:  Contingency Planning                     
  984.                                  
  985.          DESCRIPTION:  A manager's responsibility to protect 
  986.          a records storage center by recognizing vulnerable  
  987.          areas and making them more secure is discussed.     
  988.  
  989.  
  990.                        DATABASE MANAGEMENT
  991.  
  992.                                                              
  993.           AUTHOR:  Pieper, Oscar R.                           
  994.                                                              
  995.           TITLE OF ARTICLE:  Voice Authentication Wages A War 
  996.                             on Data Base Fraud               
  997.                                                              
  998.           NAME OF PERIODICAL:  Data Processing &              
  999.                               Communications Security        
  1000.           VOLUME OF PERIODICAL:  8                            
  1001.           NUMBER OF PERIODICAL:  6                            
  1002.           ISSUE DATE:  July/August 1984                       
  1003.           PAGE NUMBER(S): 12-13                               
  1004.           CATEGORY:  Data Base Security                       
  1005.          DESCRIPTION:  This article reviews the present state
  1006.          of voice authentication technology and how it       
  1007.          applies to secure data bases from bogus intruders.  
  1008.  
  1009.  
  1010.                      ENVIRONMENTAL SECURITY
  1011.  
  1012.                                                        
  1013.           AUTHOR:  Lemke, Fred H.                             
  1014.                                                              
  1015.           TITLE OF ARTICLE:  Blackouts and Computer Power     
  1016.                             Protection                       
  1017.                                                              
  1018.           NAME OF PERIODICAL:  Data Processing &              
  1019.                               Communications Security        
  1020.           VOLUME OF PERIODICAL:  12                           
  1021.           NUMBER OF PERIODICAL:   2                           
  1022.           ISSUE DATE:   Spring 1988                           
  1023.           PAGE NUMBER(S): 19-23                               
  1024.           CATEGORY:  Environmental Security                   
  1025.          DESCRIPTION:  This article is a study that was taken
  1026.          to see emerging patterns of blackouts that may be   
  1027.          useful in helping evaluate your level of blackout   
  1028.          vulnerability and then set up appropriate levels of 
  1029.          power protection for your electronic systems.       
  1030.  
  1031.  
  1032.                                                             
  1033.           AUTHOR:   Lemke, Fred H.                            
  1034.                                                              
  1035.           TITLE OF ARTICLE:  Computer Power Protection        
  1036.                                                              
  1037.                                                              
  1038.           NAME OF PERIODICAL:   Data Processing &             
  1039.                                Communications Security       
  1040.           VOLUME OF PERIODICAL:   8                           
  1041.           NUMBER OF PERIODICAL:   4                           
  1042.           ISSUE DATE:  March/April 1984                       
  1043.           PAGE NUMBER(S):  31-33                              
  1044.           CATEGORY:  Environmental Security                   
  1045.          DESCRIPTION: This article gives examples of how to  
  1046.          protect your facility against the harmful effects of
  1047.          an electrical power outage.                         
  1048.  
  1049.                                                              
  1050.           AUTHOR:  McGowan, Kevin J.                          
  1051.                                                              
  1052.           TITLE OF ARTICLE:   Computer Power Protection       
  1053.                                                              
  1054.           NAME OF PERIODICAL:  Data Processing &              
  1055.                               Communications Security        
  1056.           VOLUME OF PERIODICAL: 9                             
  1057.           NUMBER OF PERIODICAL: 5                             
  1058.           ISSUE DATE: May/June 1985                           
  1059.           PAGE NUMBER(S): 21-25                               
  1060.           CATEGORY:  Environmental Security                   
  1061.          DESCRIPTION:  This article looks at understanding   
  1062.          AC power conditions in data processing site         
  1063.          preparation and its criticality for preventing      
  1064.          future computer downtime and disruptions.           
  1065.  
  1066.  
  1067.  
  1068.                         GENERAL SECURITY
  1069.  
  1070.                                                              
  1071.           AUTHOR:   Beitman, L.                               
  1072.                                                              
  1073.           TITLE OF ARTICLE:   A Practical Guide To Small      
  1074.                              Business Computer Security      
  1075.                                                              
  1076.           NAME OF PERIODICAL:  Office                         
  1077.                                                              
  1078.           VOLUME OF PERIODICAL:  96                           
  1079.           NUMBER OF PERIODICAL:  2                            
  1080.           ISSUE DATE:   August 1982                           
  1081.           PAGE NUMBER(S):  86, 90                             
  1082.           CATEGORY:  General Security                         
  1083.                                  
  1084.          DESCRIPTION: This article gives advice on how to    
  1085.          obtain computer security in a small business        
  1086.          environment. A checklist is included that will help 
  1087.          to prevent accidental and intentional harm to a     
  1088.          system.                                             
  1089.                                                              
  1090.  
  1091.           AUTHOR:   Collins, J.A.                             
  1092.                                                              
  1093.           TITLE OF ARTICLE:   Continuous Security Control     
  1094.                              Clamps Down on Abuse            
  1095.                                                              
  1096.           NAME OF PERIODICAL:  Data Management                
  1097.                                                              
  1098.           VOLUME OF PERIODICAL:  23                           
  1099.           NUMBER OF PERIODICAL:   5                           
  1100.           ISSUE DATE:   May 1985                              
  1101.           PAGE NUMBER(S):  56-59                              
  1102.           CATEGORY:  General Security                         
  1103.                                  
  1104.          DESCRIPTION:  The need for computer access is       
  1105.          discussed in this article that suggest that such    
  1106.          access should be a management, security-oriented    
  1107.          process. Computer security guidelines are also      
  1108.          given.                                              
  1109.  
  1110.                                                            
  1111.           AUTHOR:  Coontz, Constance                          
  1112.                                                              
  1113.           TITLE OF ARTICLE:   Protection through Isolation    
  1114.                                                              
  1115.           NAME OF PERIODICAL:   Security Management           
  1116.                                                              
  1117.           VOLUME OF PERIODICAL:  31                           
  1118.           NUMBER OF PERIODICAL:  11                           
  1119.           ISSUE DATE:  November 1987                          
  1120.           PAGE NUMBER(S):   53-55                             
  1121.           CATEGORY:  General Security                         
  1122.          DESCRIPTION:  This article discusses                
  1123.          compartmentalizing valuable data on dedicated PCs or
  1124.          small computer systems to help protect it from      
  1125.          hackers and moles.                                  
  1126.  
  1127.                                                              
  1128.           AUTHOR:   Gazarek, Kenneth F.                       
  1129.                                                              
  1130.           TITLE OF ARTICLE:  Cabinets for Electromagnetic     
  1131.          Interference/Radio-Frequency Interference and       
  1132.          TEMPEST Shielding                                   
  1133.           NAME OF PERIODICAL:  Data Processing &              
  1134.                               Communications Security        
  1135.           VOLUME OF PERIODICAL:  9                            
  1136.           NUMBER OF PERIODICAL:  6                            
  1137.           ISSUE DATE:  July/August 1985                       
  1138.           PAGE NUMBER(S):  12-13                              
  1139.           CATEGORY:  General Security                         
  1140.          DESCRIPTION:  This article discusses the            
  1141.          electromagnetic interference and radio-frequency    
  1142.          interference control options, designing and building
  1143.          metal cabinets that provide effective shielding.    
  1144.  
  1145.  
  1146.                                                              
  1147.           AUTHOR:  Lobel, J.                                  
  1148.                                                              
  1149.           TITLE OF ARTICLE:   Third Decade of Concern         
  1150.                                                              
  1151.           NAME OF PERIODICAL:  Computerworld                  
  1152.                                                              
  1153.           VOLUME OF PERIODICAL:   16                          
  1154.           NUMBER OF PERIODICAL:    6                          
  1155.           ISSUE DATE:  February 8, 1982                       
  1156.           PAGE NUMBER(S):  1D/31-34 & 36                      
  1157.           CATEGORY:  General Security                         
  1158.                                  
  1159.          DESCRIPTION: The author looks at some of the issues 
  1160.          associated with distributed data processing         
  1161.          including privacy, crime, and security.             
  1162.                                                             
  1163.  
  1164.           AUTHOR:  Miskiewicz, J.                             
  1165.                                                              
  1166.           TITLE OF ARTICLE:   DP Security: A Delicate Balance 
  1167.                                                              
  1168.           NAME OF PERIODICAL:  Computer Decisions             
  1169.                                                              
  1170.           VOLUME OF PERIODICAL:   17                          
  1171.           NUMBER OF PERIODICAL:    8                          
  1172.           ISSUE DATE:  April 1985                             
  1173.           PAGE NUMBER(S):  104-106                            
  1174.           CATEGORY:  General Security                         
  1175.                                  
  1176.          DESCRIPTION:  This article discusses the delicate   
  1177.          balance between protecting vital resources in a data
  1178.          processing facility and enhancing productivity.     
  1179.  
  1180.  
  1181.          AUTHOR:  Moulton, R.                                
  1182.                                                              
  1183.           TITLE OF ARTICLE:  Prevention:  Better Than         
  1184.                             Prosecution                      
  1185.                                                              
  1186.           NAME OF PERIODICAL:  Government Data Systems        
  1187.                                                              
  1188.           VOLUME OF PERIODICAL:  10                           
  1189.           NUMBER OF PERIODICAL:   6                           
  1190.           ISSUE DATE:   November/December 1981                
  1191.           PAGE NUMBER(S):  20 & 22-23                         
  1192.           CATEGORY:  General Security                         
  1193.                                  
  1194.          DESCRIPTION:  The focus of this paper is on         
  1195.          deterrence of computer abuse, whether it is         
  1196.          unintentional or intentional.                       
  1197.  
  1198.                                                          
  1199.           AUTHOR:   Parker, D.B.                              
  1200.                                                              
  1201.           TITLE OF ARTICLE:   The Many Faces of Data          
  1202.                              Vulnerability                   
  1203.                                                              
  1204.           NAME OF PERIODICAL:  IEEE Spectrum                  
  1205.                                                              
  1206.           VOLUME OF PERIODICAL:  21                           
  1207.           NUMBER OF PERIODICAL:   5                           
  1208.           ISSUE DATE:  May 1984                               
  1209.           PAGE NUMBER(S):  46-49                              
  1210.           CATEGORY:  General Security                         
  1211.                                  
  1212.          DESCRIPTION:  Discussed in this paper are both the  
  1213.          need for new computer security methods and the      
  1214.          attainable limits that can be reached by computer   
  1215.          security.                                           
  1216.  
  1217.  
  1218.                                                              
  1219.           AUTHOR:  Rosch, W.                                  
  1220.                                                              
  1221.           TITLE OF ARTICLE: Three Products Help Cork Computer 
  1222.                            Leaks, Feature Blocked Access,    
  1223.                            Disk-File Encryption              
  1224.           NAME OF PERIODICAL:  PC Week                        
  1225.                                                              
  1226.           VOLUME OF PERIODICAL:   2                           
  1227.           NUMBER OF PERIODICAL:  18                           
  1228.           ISSUE DATE:  May 1985                               
  1229.           PAGE NUMBER(S):  122-124                            
  1230.           CATEGORY:  General Security                         
  1231.                                  
  1232.          DESCRIPTION:  This article discusses a trio of       
  1233.          products to help prevent unauthorized access to a   
  1234.          computer system.                                    
  1235.  
  1236.  
  1237.  
  1238.  
  1239.  
  1240.                                                              
  1241.           AUTHOR: Rosen, Richard D. and Dvorsky, James        
  1242.                                                              
  1243.           TITLE OF ARTICLE:  Portable Data Carrier Technology 
  1244.                                                              
  1245.           NAME OF PERIODICAL:   Data Processing &             
  1246.                                Communications Security       
  1247.           VOLUME OF PERIODICAL:  12                           
  1248.           NUMBER OF PERIODICAL:   1                           
  1249.           ISSUE DATE:  Winter 1988                            
  1250.           PAGE NUMBER(S):  9-19                               
  1251.           CATEGORY:  General Security                         
  1252.          DESCRIPTION: This article presents an overview of   
  1253.          the general field of portable data carrier          
  1254.          technology. Included are not only smart cards but   
  1255.          other devices and systems that are beginning to     
  1256.          emerge in the marketplace.                          
  1257.  
  1258.                                                              
  1259.           AUTHOR:  Srinivasan, C.A. and Dascher, P.E.         
  1260.                                                              
  1261.           TITLE OF ARTICLE:  Computer Security and Integrity: 
  1262.                             Problems and Prospects           
  1263.                                                              
  1264.           NAME OF PERIODICAL:  Infosystems                    
  1265.                                                              
  1266.           VOLUME OF PERIODICAL:  28                           
  1267.           NUMBER OF PERIODICAL:   5                           
  1268.           ISSUE DATE: May 1981                                
  1269.           PAGE NUMBER(S):  5 Pages                            
  1270.           CATEGORY:  General Security                         
  1271.                                  
  1272.          DESCRIPTION:  Various aspects of computer security  
  1273.          are discussed including data security, data privacy,
  1274.          data integrity, etc.                                
  1275.  
  1276.                                                              
  1277.           AUTHOR:  Weller, Reginald H.                        
  1278.                                                              
  1279.           TITLE OF ARTICLE: Off-Site Data Storage: A Changing 
  1280.                            Industry                          
  1281.                                                              
  1282.           NAME OF PERIODICAL:  Data Processing &              
  1283.                               Communications Security        
  1284.           VOLUME OF PERIODICAL: 9                             
  1285.           NUMBER OF PERIODICAL: 5                             
  1286.           ISSUE DATE:  May/June 1985                          
  1287.           PAGE NUMBER(S):   18-20                             
  1288.           CATEGORY:  General Security                         
  1289.          DESCRIPTION: This article discusses selecting a     
  1290.          backup site while meeting the criteria of integrity,
  1291.          reliability, access, reasonable cost, appropriate   
  1292.          location, good security, and comprehensive insurance
  1293.          coverage.                                           
  1294.  
  1295.  
  1296.                                             
  1297.           AUTHOR:   Wright, J.R. Jr.                          
  1298.                                                              
  1299.           TITLE OF ARTICLE:  User Responsibility for Security 
  1300.                                                              
  1301.           NAME OF PERIODICAL:  Government Data Systems        
  1302.                                                              
  1303.           VOLUME OF PERIODICAL:  15                           
  1304.           NUMBER OF PERIODICAL:   1                           
  1305.           ISSUE DATE:  December 1985 through January 1986     
  1306.           PAGE NUMBER(S):  52-55                              
  1307.           CATEGORY:  General Security                         
  1308.                                  
  1309.          DESCRIPTION: This article looks at the circular     
  1310.          "Management of Federal Information Resources"       
  1311.           printed by the Office of Management and Budget.    
  1312.          This circular provides guidance to Federal Managers 
  1313.          concerning computer security and the associated     
  1314.          responsibilities.                                   
  1315.  
  1316.                                                              
  1317.           AUTHOR:  Zimmerman, J.S.                            
  1318.                                                              
  1319.           TITLE OF ARTICLE:  Is Your Computer Insecure?       
  1320.                                                              
  1321.           NAME OF PERIODICAL:  Datamation                     
  1322.                                                              
  1323.           VOLUME OF PERIODICAL:   31                          
  1324.           NUMBER OF PERIODICAL:   10                          
  1325.           ISSUE DATE:  May 1985                               
  1326.           PAGE NUMBER(S):   119-120                           
  1327.           CATEGORY:  General Security                         
  1328.                                  
  1329.          DESCRIPTION:  This article challenges widely        
  1330.          accepted notions concerning computer security. It   
  1331.          suggest that people's views should be changed so    
  1332.          that the challenge will be making a security system 
  1333.          work instead of beating it.                         
  1334.  
  1335.                          LAW AND ETHICS
  1336.  
  1337.                                                              
  1338.           AUTHOR:  Bequai, August                             
  1339.                                                              
  1340.           TITLE OF ARTICLE:   Federal Computer Crime          
  1341.                              Legislation is Needed           
  1342.                                                              
  1343.           NAME OF PERIODICAL:  Data Management                
  1344.                                                              
  1345.           VOLUME OF PERIODICAL:                               
  1346.           NUMBER OF PERIODICAL:                               
  1347.           ISSUE DATE:  May 1981                               
  1348.           PAGE NUMBER(S): 22-24                               
  1349.           CATEGORY:  Law & Ethics                             
  1350.                                  
  1351.          DESCRIPTION:  The ways criminals use loopholes in   
  1352.          our present criminal justice system is discussed    
  1353.          along with a history of computer crime legislation. 
  1354.  
  1355.                                                              
  1356.           AUTHOR:   Betts, M.                                 
  1357.                                                              
  1358.           TITLE OF ARTICLE:  Reagan Systems Security          
  1359.                             Directive Under Attack           
  1360.                                                              
  1361.           NAME OF PERIODICAL:   Computerworld                 
  1362.                                                              
  1363.           VOLUME OF PERIODICAL:   19                          
  1364.           NUMBER OF PERIODICAL:   27                          
  1365.           ISSUE DATE:  July 1985                              
  1366.           PAGE NUMBER(S):  1                                  
  1367.           CATEGORY:  Law & Ethics                             
  1368.                                  
  1369.          DESCRIPTION:  This article discusses why members of 
  1370.          congress are concerned over how the National        
  1371.          Security Decision Directive 145 on computer security
  1372.          could be abused by military and intelligence        
  1373.          officials.                                          
  1374.  
  1375.  
  1376.                                                              
  1377.           AUTHOR:   Bigelow, R.P.                             
  1378.                                                              
  1379.           TITLE OF ARTICLE:  Computer Security And Law        
  1380.                                                              
  1381.           NAME OF PERIODICAL:  Infosystems                    
  1382.                                                              
  1383.           VOLUME OF PERIODICAL:   29                          
  1384.           NUMBER OF PERIODICAL:   12                          
  1385.           ISSUE DATE:  December 1982                          
  1386.           PAGE NUMBER(S):  84                                 
  1387.           CATEGORY:  Law & Ethics                             
  1388.                                  
  1389.          DESCRIPTION:  This article looks at how a memo from 
  1390.          the legal department should be structured concerning
  1391.          the protection of assets.                           
  1392.  
  1393.                                                              
  1394.           AUTHOR:  Hagopian, Greg                             
  1395.                                                              
  1396.           TITLE OF ARTICLE:   Planning and Implementing a     
  1397.                              Security Package                
  1398.                                                              
  1399.           NAME OF PERIODICAL:  Data Processing &              
  1400.                               Communications Security        
  1401.           VOLUME OF PERIODICAL:  10                           
  1402.           NUMBER OF PERIODICAL:   4                           
  1403.           ISSUE DATE:   Fall 1986                             
  1404.           PAGE NUMBER(S):  17-20                              
  1405.           CATEGORY:  Law & Ethics                             
  1406.          DESCRIPTION: This article discusses vendor selection
  1407.          and legal issues.                                   
  1408.  
  1409.  
  1410.                                                              
  1411.           AUTHOR: Roberts, J.E.                               
  1412.                                                              
  1413.           TITLE OF ARTICLE:  Filing Software Copyrights       
  1414.                                                              
  1415.                                                              
  1416.           NAME OF PERIODICAL:  Computerworld                  
  1417.                                                              
  1418.           VOLUME OF PERIODICAL:   19                          
  1419.           NUMBER OF PERIODICAL:   36                          
  1420.           ISSUE DATE:  September 1985                         
  1421.           PAGE NUMBER(S):  116                                
  1422.           CATEGORY:  Law & Ethics                             
  1423.                                  
  1424.          DESCRIPTION: This article describes how copyrighting
  1425.          software is accomplished and what copyrighted       
  1426.          software means.                                     
  1427.  
  1428.  
  1429.  
  1430.                      MICROCOMPUTER SECURITY
  1431.                                                              
  1432.           AUTHOR:  Koelle, Jim                                
  1433.                                                              
  1434.           TITLE OF ARTICLE:  What's in the Cards?             
  1435.                                                              
  1436.                                                              
  1437.           NAME OF PERIODICAL:   Security                      
  1438.                                                              
  1439.           VOLUME OF PERIODICAL:  23                           
  1440.           NUMBER OF PERIODICAL:  12                           
  1441.           ISSUE DATE:   December 1986                         
  1442.           PAGE NUMBER(S):  42-44, and 46                      
  1443.           CATEGORY:  Microcomputer Security                   
  1444.          DESCRIPTION:  This article discusses microchips and 
  1445.          how they promise to revolutionize access card       
  1446.          technology with fast, calculating, and advanced     
  1447.          memories.                                           
  1448.  
  1449.                                                              
  1450.           AUTHOR:  Rhodes, B.                                 
  1451.                                                              
  1452.           TITLE OF ARTICLE:  Micro Security That Makes Sense  
  1453.                                                              
  1454.                                                              
  1455.           NAME OF PERIODICAL:  Computer Decisions             
  1456.                                                              
  1457.           VOLUME OF PERIODICAL:  17                           
  1458.           NUMBER OF PERIODICAL:   9                           
  1459.           ISSUE DATE:  May 1985                               
  1460.           PAGE NUMBER(S):  72, 74-76                          
  1461.           CATEGORY:  Microcomputer Security                   
  1462.                                  
  1463.          DESCRIPTION: This article describes security        
  1464.          procedures that can be used by employees to solve   
  1465.          microcomputer security problems.                    
  1466.  
  1467.  
  1468.                                                              
  1469.           AUTHOR:  Zimmerman, J.S.                            
  1470.                                                              
  1471.           TITLE OF ARTICLE:  P.C. Security:  So What's New    
  1472.                                                              
  1473.           NAME OF PERIODICAL:  Datamation                     
  1474.                                                              
  1475.           VOLUME OF PERIODICAL:   31                          
  1476.           NUMBER OF PERIODICAL:   21                          
  1477.           ISSUE DATE:  November 1985                          
  1478.           PAGE NUMBER(S):  89-92                              
  1479.           CATEGORY:   Microcomputer Security                  
  1480.                                  
  1481.          DESCRIPTION:  This article looks at the problems    
  1482.          data security officers are going to encounter even  
  1483.          as they implement safeguards for micros.            
  1484.  
  1485.  
  1486.                  PHYSICAL SECURITY AND HARDWARE
  1487.  
  1488.                                                              
  1489.           AUTHOR:   Call, B.                                  
  1490.                                                              
  1491.           TITLE OF ARTICLE:   Buttress Against Computer       
  1492.                              Crime                           
  1493.                                                              
  1494.           NAME OF PERIODICAL:   PC Week                       
  1495.                                                              
  1496.           VOLUME OF PERIODICAL:    2                          
  1497.           NUMBER OF PERIODICAL:   18                          
  1498.           ISSUE DATE:  May 1985                               
  1499.           PAGE NUMBER(S):  111, 115                           
  1500.           CATEGORY:  Physical Security & Hardware             
  1501.                                  
  1502.          DESCRIPTION: The physical protection of computers is
  1503.          becoming an area of interest for more organizations.
  1504.          The increased number of physical security devices   
  1505.          illustrates this point and is discussed in this     
  1506.          article.                                            
  1507.  
  1508.  
  1509.                                                              
  1510.           AUTHOR:  Epner, S.A.                                
  1511.                                                              
  1512.           TITLE OF ARTICLE:   Computer Security:  Plenty of   
  1513.                              Questions but No Easy Answers   
  1514.                                                              
  1515.           NAME OF PERIODICAL:  Office                         
  1516.                                                              
  1517.           VOLUME OF PERIODICAL:   101                         
  1518.           NUMBER OF PERIODICAL:     3                         
  1519.           ISSUE DATE:  March 1985                             
  1520.           PAGE NUMBER(S):  74-76                              
  1521.           CATEGORY:  Physical Security & Hardware             
  1522.                                  
  1523.          DESCRIPTION: This article covers the physical       
  1524.          security of computer equipment including air        
  1525.          conditioning and power to pass cards and security   
  1526.          guards.                                             
  1527.  
  1528.  
  1529.  
  1530.                              PRIVACY
  1531.  
  1532.                                                              
  1533.           AUTHOR:  Jordan, Halmuth                            
  1534.                                                              
  1535.           TITLE OF ARTICLE:  The Search for Privacy           
  1536.                                                              
  1537.                                                              
  1538.           NAME OF PERIODICAL:   Security Management           
  1539.                                                              
  1540.           VOLUME OF PERIODICAL:  31                           
  1541.           NUMBER OF PERIODICAL:  11                           
  1542.           ISSUE DATE:  November 1987                          
  1543.           PAGE NUMBER(S):  32-36                              
  1544.           CATEGORY:  Privacy                                  
  1545.          DESCRIPTION: This article focuses on some of the    
  1546.          difficulties the legal profession is having by      
  1547.          looking at American and West German law regarding   
  1548.          electronic surveillance.                            
  1549.  
  1550.                          RISK MANAGEMENT
  1551.                                                             
  1552.           AUTHOR: Armstrong, James R.                         
  1553.                                                              
  1554.           TITLE OF ARTICLE:  Protecting the Corporate Data    
  1555.                                                              
  1556.           NAME OF PERIODICAL:  Data Processing &              
  1557.                               Communications Security        
  1558.           VOLUME OF PERIODICAL: 9                             
  1559.           NUMBER OF PERIODICAL: 4                             
  1560.           ISSUE DATE: March/April, 1985                       
  1561.           PAGE NUMBER(S): 16-17                               
  1562.           CATEGORY:  Risk Management                          
  1563.          DESCRIPTION:  This article discusses how most       
  1564.          alternative off-site lack the environmental control,
  1565.          security and accessibility needed. Includes a       
  1566.          discussion on things to consider in selecting an    
  1567.          off-site storage facility.                          
  1568.  
  1569.                                                              
  1570.           AUTHOR:   Bologna, Jack                             
  1571.                                                              
  1572.           TITLE OF ARTICLE:  Disaster/Recovery Planning: A    
  1573.                             Qualitative Approach             
  1574.           NAME OF PERIODICAL:   Data Processing &             
  1575.                                Communications Security       
  1576.           VOLUME OF PERIODICAL:  8                            
  1577.           NUMBER OF PERIODICAL:  4                            
  1578.           ISSUE DATE:  March/April 1984                       
  1579.           PAGE NUMBER(S):  11-15                              
  1580.           CATEGORY:  Risk Management                          
  1581.          DESCRIPTION: Developing a disaster/recovery plan    
  1582.          usually involves a detailed quantitative risk       
  1583.          analysis; the author offers a more qualitative      
  1584.          approach that is less time consuming and will obtain
  1585.          a higher level of commitment from management, D/P   
  1586.          staff, and users.                                   
  1587.  
  1588.  
  1589.                                                              
  1590.           AUTHOR:  Bologna, Jack                              
  1591.                                                              
  1592.           TITLE OF ARTICLE:  Industrial Security In a         
  1593.                             Nutshell: A Risk by any Other    
  1594.                             Name                             
  1595.           NAME OF PERIODICAL:  Data Processing &              
  1596.                               Communications Security        
  1597.           VOLUME OF PERIODICAL:  9                            
  1598.           NUMBER OF PERIODICAL:  5                            
  1599.           ISSUE DATE:  May/June 1985                          
  1600.           PAGE NUMBER(S):  12-13                              
  1601.           CATEGORY: Risk Management                           
  1602.          DESCRIPTION: This article discusses properly        
  1603.          understanding risk and how the opposite side of risk
  1604.          is opportunity for growth and development.          
  1605.  
  1606.                                                              
  1607.           AUTHOR:  Bologna, Jack                              
  1608.                                                              
  1609.           TITLE OF ARTICLE:  Risk Assessment Guidelines for   
  1610.                             Fidelity Insurance               
  1611.                                                              
  1612.           NAME OF PERIODICAL:  Data Processing &              
  1613.                               Communications Security        
  1614.           VOLUME OF PERIODICAL:  9                            
  1615.           NUMBER OF PERIODICAL:  4                            
  1616.           ISSUE DATE:  March/April, 1985                      
  1617.           PAGE NUMBER(S):  18-20                              
  1618.           CATEGORY:   Risk Management                         
  1619.          DESCRIPTION: This article is a review of the        
  1620.          adequacy of asset protection plans, policies,       
  1621.          procedures and controls to enlighten top management.
  1622.  
  1623.  
  1624.                                                              
  1625.           AUTHOR:  Helsing, Cherly W.                         
  1626.                                                              
  1627.           TITLE OF ARTICLE:  Disaster Recovery Options        
  1628.                                                              
  1629.           NAME OF PERIODICAL:   Security                      
  1630.                                                              
  1631.           VOLUME OF PERIODICAL:  24                           
  1632.           NUMBER OF PERIODICAL:   7                           
  1633.           ISSUE DATE:  July 1987                              
  1634.           PAGE NUMBER(S):  100-103                            
  1635.           CATEGORY:  Risk Management                          
  1636.          DESCRIPTION: This article has suggestions on how to 
  1637.          find a recovery plan that fits your firm without    
  1638.          damaging your profits.                              
  1639.  
  1640.  
  1641.                                                              
  1642.           AUTHOR:  Linden, Jack                               
  1643.                                                              
  1644.           TITLE OF ARTICLE:  Automated EDP Risk Analysis      
  1645.                             and Management                   
  1646.                                                              
  1647.           NAME OF PERIODICAL:  Data Processing &              
  1648.                               Communications Security        
  1649.           VOLUME OF PERIODICAL:  9                            
  1650.           NUMBER OF PERIODICAL:  1                            
  1651.           ISSUE DATE:  September/October 1984                 
  1652.           PAGE NUMBER(S):  16-18                              
  1653.           CATEGORY:  Risk Management                          
  1654.          DESCRIPTION: This article gives a cost effective    
  1655.          first step in developing a successful computer      
  1656.          security program using a cost benefit analysis      
  1657.          approach.                                           
  1658.  
  1659.  
  1660.                                                             
  1661.           AUTHOR:  Schweig, Barry B.                          
  1662.                                                              
  1663.           TITLE OF ARTICLE: Decision Matrix:  A Risk Handling 
  1664.                            Decision Aid                      
  1665.                                                              
  1666.           NAME OF PERIODICAL:   Data Processing &             
  1667.                                Communications Security       
  1668.           VOLUME OF PERIODICAL:  8                            
  1669.           NUMBER OF PERIODICAL:  4                            
  1670.           ISSUE DATE:  March/April 1984                       
  1671.           PAGE NUMBER(S):  16-18                              
  1672.           CATEGORY:  Risk Management                          
  1673.          DESCRIPTION:  This article discusses conceptualizing
  1674.          a decision-matrix as an integral component of a risk
  1675.          management process.                                 
  1676.  
  1677.                                                              
  1678.           AUTHOR:  Vernick, Paul R.                           
  1679.                                                              
  1680.           TITLE OF ARTICLE:  Providing Data Processing        
  1681.                             Recovery Backup                  
  1682.                                                              
  1683.           NAME OF PERIODICAL:  Data Processing &              
  1684.                               Communications Security        
  1685.           VOLUME OF PERIODICAL:  9                            
  1686.           NUMBER OF PERIODICAL:  4                            
  1687.           ISSUE DATE:  March/April, 1985                      
  1688.           PAGE NUMBER(S):   14-16                             
  1689.           CATEGORY:  Risk Management                          
  1690.          DESCRIPTION: This article covers some of the major  
  1691.          emergency and recovery planning options available   
  1692.          that need to be considered prior to the occurrence  
  1693.          of any serious emergency.                           
  1694.  
  1695.  
  1696.                        SECURITY MANAGEMENT
  1697.  
  1698.                                                              
  1699.           AUTHOR:  Bologna, Jack                              
  1700.                                                              
  1701.           TITLE OF ARTICLE:   Security Planning:  The "Tapps" 
  1702.                              Method                          
  1703.                                                              
  1704.           NAME OF PERIODICAL:   Data Processing &             
  1705.                                Communications Security       
  1706.           VOLUME OF PERIODICAL:   10                          
  1707.           NUMBER OF PERIODICAL:    4                          
  1708.           ISSUE DATE:   Fall 1986                             
  1709.           PAGE NUMBER(S):  7-11                               
  1710.           CATEGORY:  Security Management                      
  1711.          DESCRIPTION:  This article covers a system approach 
  1712.          to assets protection. It discusses an analytical    
  1713.          process called Total Assets Protection Planning     
  1714.          System (TAPPS) which consist of organization,       
  1715.          structure and mandate of the security function.     
  1716.  
  1717.  
  1718.                                                              
  1719.           AUTHOR:  Bologna, Jack                              
  1720.                                                              
  1721.           TITLE OF ARTICLE:  Selling Computer Security to     
  1722.                             Top Management                   
  1723.                                                              
  1724.           NAME OF PERIODICAL:   Data Processing &             
  1725.                                Communications Security       
  1726.           VOLUME OF PERIODICAL:  8                            
  1727.           NUMBER OF PERIODICAL:  5                            
  1728.           ISSUE DATE: May/June 1984                           
  1729.           PAGE NUMBER(S):  13-16                              
  1730.           CATEGORY:  Security Management                      
  1731.          DESCRIPTION:  This article discusses positive       
  1732.          motivational impact, minimizing risk, and cost      
  1733.          feasibility in selling computer security to top     
  1734.          managers.                                           
  1735.  
  1736.  
  1737.                                                              
  1738.           AUTHOR:    Bologna, Jack                            
  1739.                                                              
  1740.           TITLE OF ARTICLE:  Why the Corporate Security       
  1741.                             Function is Being Downsized      
  1742.                                                              
  1743.           NAME OF PERIODICAL:  Data Processing &              
  1744.                               Communications Security        
  1745.           VOLUME OF PERIODICAL: 11                            
  1746.           NUMBER OF PERIODICAL:  2                            
  1747.           ISSUE DATE:  Spring 1987                            
  1748.           PAGE NUMBER(S):  20-21                              
  1749.           CATEGORY:   Security Management                     
  1750.          DESCRIPTION:  This article discusses the disbanding 
  1751.          and dilution of corporate security functions and    
  1752.          how this effects the security of a firm.            
  1753.  
  1754.                                                              
  1755.           AUTHOR:   Goldstein, Bruce                          
  1756.                                                              
  1757.           TITLE OF ARTICLE:  Information Security: The        
  1758.                             Information Resource Management  
  1759.                             Approach                         
  1760.           NAME OF PERIODICAL:   Data Processing &             
  1761.                                Communications Security       
  1762.           VOLUME OF PERIODICAL:  8                            
  1763.           NUMBER OF PERIODICAL:  5                            
  1764.           ISSUE DATE:  May/June 1984                          
  1765.           PAGE NUMBER(S):  18-22                              
  1766.           CATEGORY:  Security Management                      
  1767.          DESCRIPTION:  This article addresses information as 
  1768.          a asset that must be protected as any other asset.  
  1769.          It also discusses information research management   
  1770.          providing the framework for a comprehensive         
  1771.          information security program.                       
  1772.  
  1773.  
  1774.                                                              
  1775.           AUTHOR:  Harris, N.L.                               
  1776.                                                              
  1777.           TITLE OF ARTICLE:  Rigid Administrative Procedures  
  1778.                             Prevent Computer Security        
  1779.                             Failure                          
  1780.           NAME OF PERIODICAL:   Data Management               
  1781.                                                              
  1782.           VOLUME OF PERIODICAL:  22                           
  1783.           NUMBER OF PERIODICAL:  12                           
  1784.           ISSUE DATE:  December 1984                          
  1785.           PAGE NUMBER(S):  13-14, 16                          
  1786.           CATEGORY:  Security Management                      
  1787.                                  
  1788.          DESCRIPTION: The best way to keep a security program
  1789.          from failing is the use of strict administrative    
  1790.          procedures. This article also discusses why some    
  1791.          systems fail.                                       
  1792.  
  1793.  
  1794.                                                          
  1795.           AUTHOR:  Reber, Jan                                 
  1796.                                                              
  1797.           TITLE OF ARTICLE:   The Essence of Industrial       
  1798.                              Espionage                       
  1799.                                                              
  1800.           NAME OF PERIODICAL:   Data Processing &             
  1801.                                Communications Security       
  1802.           VOLUME OF PERIODICAL:  10                           
  1803.           NUMBER OF PERIODICAL:   1                           
  1804.           ISSUE DATE:  Winter 1986                            
  1805.           PAGE NUMBER(S):  24-25                              
  1806.           CATEGORY:  Security Management                      
  1807.          DESCRIPTION: This article discusses understanding   
  1808.          espionage by a characteristic all spies have in     
  1809.          common "access to the target".                      
  1810.              
  1811.                  SOFTWARE AND OPERATING SYSTEM SECURITY
  1812.  
  1813.                                                              
  1814.           AUTHOR:   Adler, Stacy                              
  1815.                                                              
  1816.           TITLE OF ARTICLE:   7 Myths of Computer Security    
  1817.                                                              
  1818.           NAME OF PERIODICAL:   Security                      
  1819.                                                              
  1820.           VOLUME OF PERIODICAL:   24                          
  1821.           NUMBER OF PERIODICAL:    1                          
  1822.           ISSUE DATE:  January 1987                           
  1823.           PAGE NUMBER(S):   50-52                             
  1824.           CATEGORY:  Software & Operating System Security     
  1825.          DESCRIPTION:  This article covers consultants that  
  1826.          clear misconceptions about data protection software.
  1827.  
  1828.  
  1829.                                                              
  1830.           AUTHOR:   Edwards, J.                               
  1831.                                                              
  1832.           TITLE OF ARTICLE:  Ends in Sight for the            
  1833.                             Copy-Protection Debate           
  1834.                                                              
  1835.           NAME OF PERIODICAL:  PC Week                        
  1836.                                                              
  1837.           VOLUME OF PERIODICAL:  3                            
  1838.           NUMBER OF PERIODICAL:  1                            
  1839.           ISSUE DATE:  January 1986                           
  1840.           PAGE NUMBER(S):  101 & 105                          
  1841.           CATEGORY:  Software & Operating System Security     
  1842.                                  
  1843.          DESCRIPTION:  This protection of software from      
  1844.          unauthorized use may be coming to an end as         
  1845.          Microsoft Corporation has decided to lift the       
  1846.          protection from several of its software programs.   
  1847.  
  1848.  
  1849.                                                              
  1850.           AUTHOR:  Koreniowski, P.                            
  1851.                                                              
  1852.           TITLE OF ARTICLE:   Adapso Making Progress on       
  1853.                              Software Protection Device      
  1854.                                                              
  1855.           NAME OF PERIODICAL:  Computerworld                  
  1856.                                                              
  1857.           VOLUME OF PERIODICAL:  19                           
  1858.           NUMBER OF PERIODICAL:  24                           
  1859.           ISSUE DATE:  June 1985                              
  1860.           PAGE NUMBER(S):  8                                  
  1861.           CATEGORY:  Software & Operating System Security     
  1862.                                  
  1863.          DESCRIPTION:  This article discusses how the        
  1864.          Association of Data Processing Service Organizations
  1865.          (ADAPSO) is getting ready to announce its progress  
  1866.          in creating a software authorization mechanism.     
  1867.  
  1868.  
  1869.                                                              
  1870.           AUTHOR:  Schriever, Joe F.                          
  1871.                                                              
  1872.           TITLE OF ARTICLE:   Structuring for Security        
  1873.                                                              
  1874.           NAME OF PERIODICAL:  Data Processing &              
  1875.                               Communications Security        
  1876.           VOLUME OF PERIODICAL:  9                            
  1877.           NUMBER OF PERIODICAL:  1                            
  1878.           ISSUE DATE: September/October 1984                  
  1879.           PAGE NUMBER(S): 14-16                               
  1880.           CATEGORY:  Software & Operating System Security     
  1881.          DESCRIPTION:  This article is a set of guidelines   
  1882.          that will remove ambiguities as to what will be     
  1883.          done by whom to provide system security.            
  1884.  
  1885.  
  1886.  
  1887.                      TRAINING AND AWARENESS
  1888.  
  1889.                                                              
  1890.           AUTHOR:   Bezdek, J.                                
  1891.                                                              
  1892.           TITLE OF ARTICLE:  Across-the-Board Training        
  1893.                             Protects Data                    
  1894.                                                              
  1895.           NAME OF PERIODICAL:   Computerworld                 
  1896.                                                              
  1897.           VOLUME OF PERIODICAL:   18                          
  1898.           NUMBER OF PERIODICAL:   44                          
  1899.           ISSUE DATE:  October 1984                           
  1900.           PAGE NUMBER(S):  SR-10                              
  1901.           CATEGORY:  Training & Awareness                     
  1902.                                  
  1903.          DESCRIPTION:  This special report covers the four   
  1904.          areas that a training program in computer security  
  1905.          needs to include. These are plant physical security,
  1906.          logical security, administrative security, and the  
  1907.          legal and social aspects of security training.      
  1908.  
  1909.  
  1910.                                                              
  1911.           AUTHOR:  Bound, W.A.J.                              
  1912.                                                              
  1913.           TITLE OF ARTICLE:   Security Protecting Information 
  1914.                              Resources and Media             
  1915.                                                              
  1916.           NAME OF PERIODICAL:  Information Management         
  1917.                                                              
  1918.           VOLUME OF PERIODICAL:  18                           
  1919.           NUMBER OF PERIODICAL:   8                           
  1920.           ISSUE DATE:  August 1984                            
  1921.           PAGE NUMBER(S):  18-19                              
  1922.           CATEGORY:  Training & Awareness                     
  1923.                                  
  1924.          DESCRIPTION:  This article discusses what a manager 
  1925.          must consider when designing an office security     
  1926.          program to protect against the four vulnerabilities 
  1927.          of a system: personnel, physical, administrative,   
  1928.          and technical.                                      
  1929.  
  1930.                                                              
  1931.           AUTHOR:  Johnston, R.E.                             
  1932.                                                              
  1933.           TITLE OF ARTICLE:  What You Need To Know            
  1934.                                                              
  1935.           NAME OF PERIODICAL:  Infosystems                    
  1936.                                                              
  1937.           VOLUME OF PERIODICAL:   32                          
  1938.           NUMBER OF PERIODICAL:    1                          
  1939.           ISSUE DATE:  January 1985                           
  1940.           PAGE NUMBER(S):  56                                 
  1941.           CATEGORY:  Training & Awareness                     
  1942.                                  
  1943.          DESCRIPTION: Outlined in this article are those     
  1944.          things that should be considered when establishing  
  1945.          a computer security program or updating an existing 
  1946.          program.                                            
  1947.  
  1948.  
  1949.                                                              
  1950.           AUTHOR:  Leuser, K.G.                               
  1951.                                                              
  1952.           TITLE OF ARTICLE:   Security Programs:  Only as     
  1953.                              Good as We Make Them            
  1954.                                                              
  1955.           NAME OF PERIODICAL:   Office                        
  1956.                                                              
  1957.           VOLUME OF PERIODICAL:  100                          
  1958.           NUMBER OF PERIODICAL:    2                          
  1959.           ISSUE DATE:  August 1984                            
  1960.           PAGE NUMBER(S):  91-92                              
  1961.           CATEGORY:   Training & Awareness                    
  1962.                                  
  1963.          DESCRIPTION:  Discusses how an effective security   
  1964.          program helps to foil or discourage people with     
  1965.          dishonest intentions. Looks at the office           
  1966.          administrator's domain to identify areas of         
  1967.          potential vulnerability.                            
  1968.  
  1969.                                                             
  1970.           AUTHOR:   Weber, A.                                 
  1971.                                                              
  1972.           TITLE OF ARTICLE:   Effective Security Programs     
  1973.                              Start with Awareness            
  1974.                                                              
  1975.           NAME OF PERIODICAL:  Data Management                
  1976.                                                              
  1977.           VOLUME OF PERIODICAL:   23                          
  1978.           NUMBER OF PERIODICAL:   11                          
  1979.           ISSUE DATE:  November 1985                          
  1980.           PAGE NUMBER(S):   34-35                             
  1981.           CATEGORY:  Training & Awareness                     
  1982.                                  
  1983.          DESCRIPTION:  Educating end users is the key to     
  1984.          helping prevent crime and computer abuse in an      
  1985.          organization.                                       
  1986.  
  1987.  
  1988.  
  1989.                       AUTHORS NOT SPECIFIED
  1990.  
  1991.                        ABUSE/MISUSE/CRIME
  1992.                                                              
  1993.           AUTHOR:   Not Specified                             
  1994.                                                              
  1995.           TITLE OF ARTICLE:  Computer "Hacking" is No Longer  
  1996.                             Just a Lark                      
  1997.                                                              
  1998.           NAME OF PERIODICAL:  Office                         
  1999.                                                              
  2000.           VOLUME OF PERIODICAL:  102                          
  2001.           NUMBER OF PERIODICAL:  3                            
  2002.           ISSUE DATE:  September 1985                         
  2003.           PAGE NUMBER(S):  90-95                              
  2004.           CATEGORY:  Abuse/Misuse/Crime                       
  2005.                                  
  2006.          DESCRIPTION:  Computer hackers will use computers to
  2007.          obtain information and resell it, use it for        
  2008.          blackmail, extortion, and espionage. This article   
  2009.          discusses techniques for preventing hackers from    
  2010.          getting on a system, and monitoring them if they are
  2011.          discovered.                                         
  2012.  
  2013.  
  2014.                                                          
  2015.           AUTHOR:   Not Specified                             
  2016.                                                              
  2017.           TITLE OF ARTICLE:  Computer Security:  The Menace   
  2018.                             is Human Error                   
  2019.                                                              
  2020.           NAME OF PERIODICAL:  Office                         
  2021.                                                              
  2022.           VOLUME OF PERIODICAL:  99                           
  2023.           NUMBER OF PERIODICAL:  3                            
  2024.           ISSUE DATE:  March 1984                             
  2025.           PAGE NUMBER(S):  119-120                            
  2026.           CATEGORY:  Abuse/Misuse/Crime                       
  2027.                                  
  2028.          DESCRIPTION:  This article stresses that managers   
  2029.          should understand that data security is a people    
  2030.          problem and not a computer problem. People are the  
  2031.          ones that either accidentally or intentionally      
  2032.          misuse a computer system.                           
  2033.  
  2034.  
  2035.                                                              
  2036.           AUTHOR:  Not Specified                              
  2037.                                                              
  2038.           TITLE OF ARTICLE:  Internal Security                
  2039.                                                              
  2040.           NAME OF PERIODICAL:  PC Week                        
  2041.                                                              
  2042.           VOLUME OF PERIODICAL: 2                             
  2043.           NUMBER OF PERIODICAL: 18                            
  2044.           ISSUE DATE: May 1985                                
  2045.           PAGE NUMBER(S): 89-91, 106-107                      
  2046.           CATEGORY:  Abuse/Misuse/Crime                       
  2047.                                  
  2048.          DESCRIPTION: Experts feel that local computer access
  2049.          is more prone to intrusion than long-distance       
  2050.          access. This article discusses how insiders in a    
  2051.          company are the ones most likely to abuse a computer
  2052.          system.                                             
  2053.  
  2054.                                                              
  2055.           AUTHOR:  Not Specified                              
  2056.                                                              
  2057.           TITLE OF ARTICLE: Reporting Computer Crime          
  2058.                                                              
  2059.           NAME OF PERIODICAL:  Data Processing &              
  2060.                               Communications Security        
  2061.           VOLUME OF PERIODICAL:  8                            
  2062.           NUMBER OF PERIODICAL:  6                            
  2063.           ISSUE DATE:  July/August 1984                       
  2064.           PAGE NUMBER(S):  20-21                              
  2065.           CATEGORY:  Abuse/Misuse/Crime                       
  2066.          DESCRIPTION: This article presents a suggested      
  2067.          format for a final report to use in documenting     
  2068.          actions surrounding a computer crime.               
  2069.  
  2070.  
  2071.  
  2072.                          ACCESS CONTROL
  2073.  
  2074.  
  2075.                                                              
  2076.           AUTHOR:   Not Specified                             
  2077.                                                              
  2078.           TITLE OF ARTICLE:  Communications and Systems       
  2079.                             Security                         
  2080.                                                              
  2081.           NAME OF PERIODICAL:   Data Processing &             
  2082.                                Communications Security       
  2083.           VOLUME OF PERIODICAL:  9                            
  2084.           NUMBER OF PERIODICAL:  3                            
  2085.           ISSUE DATE:  1985 Buyer's Directory                 
  2086.           PAGE NUMBER(S):  11-13                              
  2087.           CATEGORY:  Access Control                           
  2088.          DESCRIPTION:  This article discusses a wide variety 
  2089.          of communications and system security  protection   
  2090.          methods. Includes encryption, fiber optics, key     
  2091.          management, optical links, electrical emanations,   
  2092.          and dial-up access protection devices.              
  2093.  
  2094.  
  2095.                                                              
  2096.           AUTHOR:   Not Specified                             
  2097.                                                              
  2098.           TITLE OF ARTICLE:   Computer Communications         
  2099.                              Security Lexicon                
  2100.                                                              
  2101.           NAME OF PERIODICAL:   Data Processing &             
  2102.                                Communications Security       
  2103.           VOLUME OF PERIODICAL:   11                          
  2104.           NUMBER OF PERIODICAL:    2                          
  2105.           ISSUE DATE: Spring 1987                             
  2106.           PAGE NUMBER(S):  22-23                              
  2107.           CATEGORY:   Access Control                          
  2108.          DESCRIPTION:  This article is an update containing  
  2109.          some new added security definitions of terms and    
  2110.          phrases.                                            
  2111.  
  2112.                                                              
  2113.           AUTHOR:  Not Specified                              
  2114.                                                              
  2115.           TITLE OF ARTICLE:  Controlling Access To Your Data  
  2116.                                                              
  2117.           NAME OF PERIODICAL:  Personal Computing             
  2118.                                                              
  2119.           VOLUME OF PERIODICAL:   9                           
  2120.           NUMBER OF PERIODICAL:   9                           
  2121.           ISSUE DATE:  September 1985                         
  2122.           PAGE NUMBER(S): 60-72                               
  2123.           CATEGORY:  Access Control                           
  2124.                                  
  2125.          DESCRIPTION:  Explains measures that can be taken   
  2126.          to protect what's in a computer. Focuses not only   
  2127.          on vandals, but also on people who accidentally harm
  2128.          the computer.                                       
  2129.  
  2130.  
  2131.  
  2132.                                                              
  2133.           AUTHOR:   Not Specified                             
  2134.                                                              
  2135.           TITLE OF ARTICLE:  Dial-Up Access Security Products 
  2136.                                                              
  2137.           NAME OF PERIODICAL:   Data Processing &             
  2138.                                Communications Security       
  2139.           VOLUME OF PERIODICAL:  9                            
  2140.           NUMBER OF PERIODICAL:  2                            
  2141.           ISSUE DATE:  November/December 1984                 
  2142.           PAGE NUMBER(S):  21-24                              
  2143.           CATEGORY:  Access Control                           
  2144.          DESCRIPTION:  This article presents some new dial-up
  2145.          access security products and their major features.  
  2146.  
  2147.  
  2148.  
  2149.                                                              
  2150.           AUTHOR:  Not Specified                              
  2151.                                                              
  2152.           TITLE OF ARTICLE:  Enhancements Out For Barrier     
  2153.                             Security Devices                 
  2154.                                                              
  2155.           NAME OF PERIODICAL:  Computerworld                  
  2156.                                                              
  2157.           VOLUME OF PERIODICAL:   18                          
  2158.           NUMBER OF PERIODICAL:   35                          
  2159.           ISSUE DATE:  August 1984                            
  2160.           PAGE NUMBER(S):  51                                 
  2161.           CATEGORY:  Access Control                           
  2162.                                  
  2163.          DESCRIPTION: This article discusses the password    
  2164.          protection device designed by International Anasazi,
  2165.          Inc. that will limit access on dial-up lines.       
  2166.  
  2167.  
  2168.  
  2169.                                                              
  2170.           AUTHOR:   Not Specified                             
  2171.                                                              
  2172.           TITLE OF ARTICLE:  Firesign Unwraps Security        
  2173.                             Feature                          
  2174.                                                              
  2175.           NAME OF PERIODICAL:  MIS Week                       
  2176.                                                              
  2177.           VOLUME OF PERIODICAL:   5                           
  2178.           NUMBER OF PERIODICAL:   23                          
  2179.           ISSUE DATE: June 1984                               
  2180.           PAGE NUMBER(S):  24                                 
  2181.           CATEGORY:  Access Control                           
  2182.                                  
  2183.          DESCRIPTION: This article discusses Firesign        
  2184.          Computer Company's product that provides for network
  2185.          security by its password system.                    
  2186.  
  2187.  
  2188.                                                              
  2189.           AUTHOR:   Not Specified                             
  2190.                                                              
  2191.           TITLE OF ARTICLE:  Security Computer Outsmarts      
  2192.                             Colorado Bandits                 
  2193.                                                              
  2194.           NAME OF PERIODICAL:   Data Management               
  2195.                                                              
  2196.           VOLUME OF PERIODICAL:   19                          
  2197.           NUMBER OF PERIODICAL:   7                           
  2198.           ISSUE DATE:   July 1981                             
  2199.           PAGE NUMBER(S):  17-18                              
  2200.           CATEGORY:  Access Control                           
  2201.                                  
  2202.          DESCRIPTION: This article looks at the effectiveness
  2203.          of a security system that controls access to several
  2204.          high-rise buildings in Colorado.                    
  2205.  
  2206.  
  2207.                                                              
  2208.           AUTHOR:  Not Specified                              
  2209.                                                              
  2210.           TITLE OF ARTICLE:  Security Lock Ready for PCs      
  2211.                                                              
  2212.           NAME OF PERIODICAL:  MIS Week                       
  2213.                                                              
  2214.           VOLUME OF PERIODICAL:   6                           
  2215.           NUMBER OF PERIODICAL:   26                          
  2216.           ISSUE DATE:  July 1985                              
  2217.           PAGE NUMBER(S):  30                                 
  2218.           CATEGORY:  Access Control                           
  2219.                                  
  2220.          DESCRIPTION: The hard disk security product "Knight 
  2221.          Data Security Manager" is discussed. This product   
  2222.          allows password protection in a PC.                 
  2223.  
  2224.  
  2225.  
  2226.                       CONTINGENCY PLANNING
  2227.                                                             
  2228.           AUTHOR:   Not Specified                             
  2229.                                                              
  2230.           TITLE OF ARTICLE:   Automated Contingency Planning  
  2231.                                                              
  2232.           NAME OF PERIODICAL:   Data Processing &             
  2233.                                Communications Security       
  2234.           VOLUME OF PERIODICAL:  8                            
  2235.           NUMBER OF PERIODICAL:  4                            
  2236.           ISSUE DATE:  March/April 1984                       
  2237.           PAGE NUMBER(S):  22                                 
  2238.           CATEGORY:  Contingency Planning                     
  2239.          DESCRIPTION:   This article presents a special      
  2240.          purpose software package CHI/COR that deals with    
  2241.          the job of documenting the resources needed to      
  2242.          implement a disaster recovery plan.                 
  2243.  
  2244.                                                              
  2245.           AUTHOR:   Not Specified                             
  2246.                                                              
  2247.           TITLE OF ARTICLE:  Contingency Planning and the Law 
  2248.                                                              
  2249.           NAME OF PERIODICAL:   Data Processing &             
  2250.                                Communications Security       
  2251.           VOLUME OF PERIODICAL:  8                            
  2252.           NUMBER OF PERIODICAL:  4                            
  2253.           ISSUE DATE:  March/April 1984                       
  2254.           PAGE NUMBER(S):  17-18                              
  2255.           CATEGORY:   Contingency Planning                    
  2256.          DESCRIPTION:  This article reviews the Foreign      
  2257.          Corrupt Practices Act and its requirement for record
  2258.          keeping and internal controls. Other potential legal
  2259.          liabilities are also reviewed.                      
  2260.  
  2261.  
  2262.                      ENVIRONMENTAL SECURITY
  2263.  
  2264.                                                              
  2265.           AUTHOR:    Not Specified                            
  2266.                                                              
  2267.           TITLE OF ARTICLE:  Computer Power and Environmental 
  2268.                             Controls                         
  2269.                                                              
  2270.           NAME OF PERIODICAL:  Data Processing &              
  2271.                               Communications Security        
  2272.           VOLUME OF PERIODICAL: 9                             
  2273.           NUMBER OF PERIODICAL: 3                             
  2274.           ISSUE DATE:  1985 Buyer's Directory                 
  2275.           PAGE NUMBER(S):  13                                 
  2276.           CATEGORY:  Environmental Security                   
  2277.          DESCRIPTION:  This article discusses common power   
  2278.          anomalies and equipment available to overcome them. 
  2279.  
  2280.  
  2281.                         GENERAL SECURITY
  2282.  
  2283.                                                              
  2284.           AUTHOR:    Not Specified                            
  2285.                                                              
  2286.           TITLE OF ARTICLE:  Computer Back-up Facilities      
  2287.                                                              
  2288.                                                              
  2289.           NAME OF PERIODICAL:  Data Processing &              
  2290.                               Communications Security        
  2291.           VOLUME OF PERIODICAL: 8                             
  2292.           NUMBER OF PERIODICAL: 4                             
  2293.           ISSUE DATE:  March/April 1984                       
  2294.           PAGE NUMBER(S): 19-22                               
  2295.           CATEGORY:  General Security                         
  2296.          DESCRIPTION:  This article discusses the options of 
  2297.          back-up sites including cold sites, hot sites, or   
  2298.          empty shell, or fully equipped recovery sites. Also 
  2299.          refers to the extent of equipment, space, and       
  2300.          services provided by these back-up facilities.      
  2301.  
  2302.  
  2303.                                                              
  2304.           AUTHOR:    Not Specified                            
  2305.                                                              
  2306.           TITLE OF ARTICLE:  Computer Security:  Issues and   
  2307.                             Answers                          
  2308.                                                              
  2309.           NAME OF PERIODICAL:   Datamation                    
  2310.                                                              
  2311.           VOLUME OF PERIODICAL:                               
  2312.           NUMBER OF PERIODICAL:                               
  2313.           ISSUE DATE:  September 15, 1984                     
  2314.           PAGE NUMBER(S):  16 Pages                           
  2315.           CATEGORY:   General Security                        
  2316.                                  
  2317.          DESCRIPTION:  This 16-page section sponsored by the 
  2318.          Computer Security Institute contains several        
  2319.          articles that cover a variety of computer security  
  2320.          issues.                                             
  2321.  
  2322.                                                              
  2323.           AUTHOR:    Not Specified                            
  2324.                                                              
  2325.           TITLE OF ARTICLE:  Computer Security:  Issues and   
  2326.                             Answers                          
  2327.                                                              
  2328.           NAME OF PERIODICAL:   Datamation                    
  2329.                                                              
  2330.           VOLUME OF PERIODICAL:                               
  2331.           NUMBER OF PERIODICAL:                               
  2332.           ISSUE DATE:    September 15 1985                    
  2333.           PAGE NUMBER(S):  24 Pages                           
  2334.           CATEGORY:    General Security                       
  2335.                                  
  2336.          DESCRIPTION:  This advertisement section contains   
  2337.          eight articles that discuss a variety of computer   
  2338.          security issues. The authors include FBI Director   
  2339.          William Webster and Department of Defense Computer  
  2340.          Security Center Director Robert Brotzman.           
  2341.  
  2342.  
  2343.                                                              
  2344.           AUTHOR:    Not Specified                            
  2345.                                                              
  2346.           TITLE OF ARTICLE:  Making The Case For Computer     
  2347.                             Security Pure and Simple         
  2348.                                                              
  2349.           NAME OF PERIODICAL:   Datamation                    
  2350.                                                              
  2351.           VOLUME OF PERIODICAL:                               
  2352.           NUMBER OF PERIODICAL:                               
  2353.           ISSUE DATE:  September 1983                         
  2354.           PAGE NUMBER(S):                                     
  2355.           CATEGORY:  General Security                         
  2356.                                  
  2357.          DESCRIPTION: This section of Datamation is sponsored
  2358.          by the Computer Security Institute and covers a     
  2359.          broad range of computer security issues in several  
  2360.          different articles.                                 
  2361.  
  2362.  
  2363.                                                              
  2364.           AUTHOR:   Not Specified                             
  2365.                                                              
  2366.           TITLE OF ARTICLE:   Personal Computers vs. Data     
  2367.                              Data Security:  the Two Need    
  2368.                              Not Be Incompatible             
  2369.           NAME OF PERIODICAL:  Data Processing &              
  2370.                               Communications Security        
  2371.           VOLUME OF PERIODICAL:  12                           
  2372.           NUMBER OF PERIODICAL:   1                           
  2373.           ISSUE DATE:  Winter 1988                            
  2374.           PAGE NUMBER(S):  24-26                              
  2375.           CATEGORY:  General Security                         
  2376.          DESCRIPTION:  This article discusses the threat of  
  2377.          data loss either intentional or unintentional. It   
  2378.          examines the significant risks and the data security
  2379.          policies to lower these risks.                      
  2380.  
  2381.                                                              
  2382.           AUTHOR:    Not Specified                            
  2383.                                                              
  2384.           TITLE OF ARTICLE:   Protecting Information and      
  2385.                              Interest                        
  2386.                                                              
  2387.           NAME OF PERIODICAL:  Computer Management            
  2388.                                                              
  2389.           VOLUME OF PERIODICAL:                               
  2390.           NUMBER OF PERIODICAL:                               
  2391.           ISSUE DATE:  October 1981                           
  2392.           PAGE NUMBER(S):  33-34, 36                          
  2393.           CATEGORY:  General Security                         
  2394.                                  
  2395.          DESCRIPTION:  Suppliers, consultants, and services  
  2396.          related to computer security are listed in this     
  2397.          directory.                                          
  2398.  
  2399.                                                              
  2400.           AUTHOR:    Not Specified                            
  2401.                                                              
  2402.           TITLE OF ARTICLE:  Simple Security Precautions      
  2403.                             Ensure Information Safety        
  2404.                                                              
  2405.           NAME OF PERIODICAL:  Computerworld                  
  2406.                                                              
  2407.           VOLUME OF PERIODICAL:   19                          
  2408.           NUMBER OF PERIODICAL:   17                          
  2409.           ISSUE DATE:   April 1985                            
  2410.           PAGE NUMBER(S):   SR-38                             
  2411.           CATEGORY:  General Security                         
  2412.                                  
  2413.          DESCRIPTION:  This article applies many of the      
  2414.          security precautions for mainframes to the          
  2415.          microcomputer.                                      
  2416.  
  2417.  
  2418.  
  2419.                      MICROCOMPUTER SECURITY
  2420.                                                              
  2421.           AUTHOR:   Not Specified                             
  2422.                                                              
  2423.           TITLE OF ARTICLE:  Memo:  Disaster Plan For         
  2424.                             Microcomputer Users              
  2425.                                                              
  2426.           NAME OF PERIODICAL:   Data Processing &             
  2427.                                Communications Security       
  2428.           VOLUME OF PERIODICAL:  8                            
  2429.           NUMBER OF PERIODICAL:  4                            
  2430.           ISSUE DATE:  March/April 1984                       
  2431.           PAGE NUMBER(S):  27-29                              
  2432.           CATEGORY:   Microcomputer Security                  
  2433.          DESCRIPTION:  This article is in the form a memo    
  2434.          containing a microcomputer disaster recovery        
  2435.          checklist. It address issues that should be taken in
  2436.          contingency plans.                                  
  2437.  
  2438.  
  2439.                  PHYSICAL SECURITY AND HARDWARE
  2440.  
  2441.                                                              
  2442.           AUTHOR:   Not Specified                             
  2443.                                                              
  2444.           TITLE OF ARTICLE:   Media Safes:  Countering the    
  2445.                              Threats of Fire                 
  2446.                                                              
  2447.           NAME OF PERIODICAL:  Data Processing &              
  2448.                               Communications Security        
  2449.           VOLUME OF PERIODICAL:  9                            
  2450.           NUMBER OF PERIODICAL:  6                            
  2451.           ISSUE DATE:  July/August 1985                       
  2452.           PAGE NUMBER(S):  18-20                              
  2453.           CATEGORY:  Physical Security & Hardware             
  2454.          DESCRIPTION: This article is a review of critical   
  2455.          basic information on how to select fire resistant   
  2456.          media safes.                                        
  2457.  
  2458.  
  2459.                          RISK MANAGEMENT
  2460.  
  2461.                                                              
  2462.           AUTHOR:    Not Specified                            
  2463.                                                              
  2464.           TITLE OF ARTICLE:  Protecting The World's Largest   
  2465.                             Computer User                    
  2466.                                                              
  2467.           NAME OF PERIODICAL:  Data Processing &              
  2468.                               Communications Security        
  2469.           VOLUME OF PERIODICAL: 8                             
  2470.           NUMBER OF PERIODICAL: 4                             
  2471.           ISSUE DATE:  March/April 1984                       
  2472.           PAGE NUMBER(S):  25-26                              
  2473.           CATEGORY:   Risk Management                         
  2474.          DESCRIPTION: This article discusses a new high      
  2475.          security off-site storage facility opening in       
  2476.          Beltsville, Maryland. It also address concern with  
  2477.          the lack of proper security storage today.          
  2478.  
  2479.  
  2480.                        SECURITY MANAGEMENT
  2481.  
  2482.                                                             
  2483.           AUTHOR:    Not Specified                            
  2484.                                                              
  2485.           TITLE OF ARTICLE:  Computer Security Awareness:     
  2486.                             Organizations and Senior         
  2487.                             Management Concerns              
  2488.           NAME OF PERIODICAL:  Data Processing &              
  2489.                               Communications Security        
  2490.           VOLUME OF PERIODICAL:  8                            
  2491.           NUMBER OF PERIODICAL:  5                            
  2492.           ISSUE DATE:  May/June 1984                          
  2493.           PAGE NUMBER(S):  12-13                              
  2494.           CATEGORY:  Security Management                      
  2495.          DESCRIPTION:  This article gives the result of a    
  2496.          survey of general security and computer security    
  2497.          personnel, EDP auditors, and internal auditors to   
  2498.          determine the computer security awareness of their  
  2499.          company and senior management.                      
  2500.  
  2501.                                                              
  2502.           AUTHOR:    Not Specified                            
  2503.                                                              
  2504.           TITLE OF ARTICLE:  Records Storage and Management   
  2505.                                                              
  2506.           NAME OF PERIODICAL:    Data Processing &            
  2507.                                 Communications Security      
  2508.           VOLUME OF PERIODICAL:  8                            
  2509.           NUMBER OF PERIODICAL:  4                            
  2510.           ISSUE DATE:  March/April 1984                       
  2511.           PAGE NUMBER(S):  23-25                              
  2512.           CATEGORY:   Security Management                     
  2513.          DESCRIPTION:  This article addresses the questions  
  2514.          which records should be stored off-site, and how    
  2515.          can an off-site facility be evaluated? It also      
  2516.          provides an overview of areas to consider.          
  2517.  
  2518.  
  2519.  
  2520.              SOFTWARE AND OPERATING SYSTEM SECURITY
  2521.  
  2522.                                                             
  2523.           AUTHOR:    Not Specified                            
  2524.                                                              
  2525.           TITLE OF ARTICLE:  Computer Security Software       
  2526.                                                              
  2527.           NAME OF PERIODICAL:   Data Processing &             
  2528.                                Communications Security       
  2529.           VOLUME OF PERIODICAL:  9                            
  2530.           NUMBER OF PERIODICAL:  1                            
  2531.           ISSUE DATE:  September/October 1984                 
  2532.           PAGE NUMBER(S):  19-24                              
  2533.           CATEGORY:  Software & Operating System Security     
  2534.          DESCRIPTION:  This article provides information for 
  2535.          using access control software to protect the        
  2536.          terminals, the data and the system itself from      
  2537.          unauthorized use.                                   
  2538.  
  2539.                                                              
  2540.           AUTHOR:    Not Specified                            
  2541.                                                              
  2542.           TITLE OF ARTICLE:  Computer Security Software       
  2543.                                                              
  2544.           NAME OF PERIODICAL:  Data Processing &              
  2545.                               Communications Security        
  2546.           VOLUME OF PERIODICAL:  9                            
  2547.           NUMBER OF PERIODICAL:  3                            
  2548.           ISSUE DATE:  1985 Buyer's Directory                 
  2549.           PAGE NUMBER(S):  17-18                              
  2550.           CATEGORY:  Software and Operating System Security   
  2551.          DESCRIPTION:  This article addresses a wide variety 
  2552.          of computer security software programs and their    
  2553.          different uses.                                     
  2554.  
  2555.                                                              
  2556.           AUTHOR:    Not Specified                            
  2557.                                                              
  2558.           TITLE OF ARTICLE:   Protecting Software With        
  2559.                              Escrow Services                 
  2560.                                                              
  2561.           NAME OF PERIODICAL:  Data Processing &              
  2562.                               Communications Security        
  2563.           VOLUME OF PERIODICAL:  8                            
  2564.           NUMBER OF PERIODICAL:  5                            
  2565.           ISSUE DATE:  May/June 1984                          
  2566.           PAGE NUMBER(S):  22-24                              
  2567.           CATEGORY:  Software & Operating System Security     
  2568.          DESCRIPTION:  This article addresses some of the    
  2569.          problems and answers for protecting software that   
  2570.          concerns major management today.                    
  2571.  
  2572. 
  2573. Downloaded From P-80 International Information Systems 304-744-2253
  2574.