home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 142.6 KB | 2,573 lines |
-
- BIBLIOGRAPHY OF COMPUTER SECURITY ARTICLES
- 1983 THROUGH 1988
-
- (Note: A bibliograpghy is now being developed to encompass
- 1989.)
-
- AUTHORS SPECIFIED
-
- ABUSE/MISUSE/CRIME
-
-
- AUTHOR: Associated Press
-
- TITLE OF ARTICLE: Jury Selection In 1st "Virus"
- Trial Begins
-
- NAME OF PERIODICAL: Washington Post
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL: 277
- ISSUE DATE: September 7, 1988
- PAGE NUMBER(S): C1
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article is about a programmer
- accused of using a computer "virus" to sabotage
- thousands of records at his former work place.
-
-
- AUTHOR: Atkinson, L.V.
-
- TITLE OF ARTICLE: Fraud: Input Data Most
- Vulnerable
-
- NAME OF PERIODICAL: Computerworld UK
-
- VOLUME OF PERIODICAL: 2
- NUMBER OF PERIODICAL: 21
- ISSUE DATE: September 2, 1981
- PAGE NUMBER(S): 10
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: Article discusses a survey which
- found that the major danger to computers was the
- alteration of input data.
-
-
- AUTHOR: Baker, R.H.
-
- TITLE OF ARTICLE: Lining Up Computer Crooks
-
- NAME OF PERIODICAL: Micro Communications
-
- VOLUME OF PERIODICAL: 2
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May 1985
- PAGE NUMBER(S): 18-22
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article looks at crime patterns
- of microcomputer users breaking into mainframes.
- Ways in which these patterns can be learned and then
- stopped is discussed.
-
-
- AUTHOR: Bequai, A.
-
- TITLE OF ARTICLE: What to do About Crime in the
- Electronic Office
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL: 101
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: January 1985
- PAGE NUMBER(S): 101-104
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article discusses the important
- role that auditing computer systems plays in
- preventing crimes and abuse.
-
-
- AUTHOR: Betts, M.
-
- TITLE OF ARTICLE: Government's Computers
- "Highly Vulnerable" to Abuse
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 18
- NUMBER OF PERIODICAL: 40
- ISSUE DATE: October 1984
- PAGE NUMBER(S): 4
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: Discusses how highly vulnerable the
- federal government's computers are to abuse, and a
- congressman who is seeking to change that
- vulnerability.
-
-
- AUTHOR: Blakeney, S.
-
- TITLE OF ARTICLE: Computer Crime: A Worldwide
- Concern
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 17, 18
- NUMBER OF PERIODICAL: 52, 1
- ISSUE DATE: December 26, 1983, January 1984
- PAGE NUMBER(S): 57-60
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article looks at computer crime
- as a worldwide problem. The most common types of
- computer crimes are given along with the estimated
- losses in various countries throughout the world.
-
-
- AUTHOR: Bologna, Jack
-
- TITLE OF ARTICLE: Computer Related Crime: The Who,
- What, Where, When, Why and How
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 10
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: Winter 1986
- PAGE NUMBER(S): 19-23
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article looks at computer related
- crime from the perspectives of the individual
- criminal, environmental factors, organization
- cultures, incidence rate, and security
- countermeasures.
-
-
- AUTHOR: Bramer, W.L.
-
- TITLE OF ARTICLE: Computer and Data Security is
- Battle Cry to the '80s
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL: 103
- NUMBER OF PERIODICAL: 3
- ISSUE DATE: March 1986
- PAGE NUMBER(S): 78-82
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article discusses the number of
- organizations that are looking at their security
- procedures and programs to deter computer abuse. The
- three main causes of security problems are
- described.
-
-
- AUTHOR: Carey, Cameron
-
- TITLE OF ARTICLE: Data Access Control: Help or
- Hindrance
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 11
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: Fall 1987
- PAGE NUMBER(S): 18-20
- CATEGORY: Access Control
- DESCRIPTION: This article discusses limiting access
- to data and how to make access control protection
- more of a help than a hindrance by developing a set
- of priorities about various classes of data.
-
- AUTHOR: Edwards, M.
-
- TITLE OF ARTICLE: The Sting in a Micro's Tail
-
-
- NAME OF PERIODICAL: Practical Computing
-
- VOLUME OF PERIODICAL: 6
- NUMBER OF PERIODICAL: 12
- ISSUE DATE: December 1983
- PAGE NUMBER(S): 108-109
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: How criminals exploit information
- technology is described in this article along with
- ways to stop them.
-
-
- AUTHOR: Elmer-Dewitt, Phillip
-
- TITLE OF ARTICLE: Invasion of the Data Snatchers!
-
- NAME OF PERIODICAL: Time Magazine
-
- VOLUME OF PERIODICAL: 123
- NUMBER OF PERIODICAL: 13
- ISSUE DATE: September 26, 1988
- PAGE NUMBER(S): 62-67
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: Discusses the current threat to
- computer systems posed by computer viruses. Computer
- viruses are defined and several examples of viruses
- are given.
-
-
- AUTHOR: Johnson, B.
-
- TITLE OF ARTICLE: Criminal Minds Keep Pace with
- Technology. Stop, Thief!
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 15, 16
- NUMBER OF PERIODICAL: 52, 1
- ISSUE DATE: December 28, 1981, January 4, 1982
- PAGE NUMBER(S):
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article looks at some of the
- common problems that the DP industry faces today
- including computer security, asset protection, and
- computer fraud prevention.
-
-
- AUTHOR: Kluepfel, Henry M.
-
- TITLE OF ARTICLE: Computer Security for the
- Abuser Friendly Environment
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: November/December 1984
- PAGE NUMBER(S): 16-20
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article discusses the underlying
- lack of adequate controls in computer systems and
- their relation to computer abuse and crime.
-
-
- AUTHOR: Kull, D.
-
- TITLE OF ARTICLE: How to Make Even E.F. Hutton
- Listen
-
- NAME OF PERIODICAL: Computer Decisions
-
- VOLUME OF PERIODICAL: 17
- NUMBER OF PERIODICAL: 18
- ISSUE DATE: September 1985
- PAGE NUMBER(S): 42-50
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: The most effective way for an
- organization to prevent breaches in a computer
- system is to plug the holes that have already been
- used to violate the system and identify the
- intruders.
-
-
- AUTHOR: Lasden, Martin
-
- TITLE OF ARTICLE: Computer Crime
-
- NAME OF PERIODICAL: Computer Decisions
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: June 1981
- PAGE NUMBER(S): 104-106, 108 112, 116, 118, 120,
- 122, 124
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article discusses actual computer
- crimes that have taken place and the factors that
- escalate the risk of an organization from these
- types of crime.
-
-
- AUTHOR: Lucas, D.
-
- TITLE OF ARTICLE: The Invisible Enemy
-
- NAME OF PERIODICAL: Business Computing and
- Communication
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: February 1985
- PAGE NUMBER(S): 18-20
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article describes how home
- computer users are breaking into some of Britain's
- mainframe computers. Various procedures that can
- protect against intrusion are also discussed by the
- author.
-
- AUTHOR: McKibbin, W.L.
-
- TITLE OF ARTICLE: Who Gets The Blame For Computer
- Crime
-
- NAME OF PERIODICAL: Infosystems
-
- VOLUME OF PERIODICAL: 30
- NUMBER OF PERIODICAL: 7
- ISSUE DATE: July 1983
- PAGE NUMBER(S): 34-36
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: MIS managers are ultimately responsible
- for the security of their computers. Since they are
- responsible they should make sure upper management
- is aware of the vulnerabilities of their computers.
-
-
- AUTHOR: Mylott, T.R.
-
- TITLE OF ARTICLE: Computer Security and the
- Threats from Within
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL: 101
- NUMBER OF PERIODICAL: 3
- ISSUE DATE: March 1985
- PAGE NUMBER(S): 45-46, 190
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article explains that the greatest
- computer-related danger to a company may be from
- internal threats by employees.
-
-
- AUTHOR: White, L.
-
- TITLE OF ARTICLE: Data Security - You Can't
- Work Without It
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 11A
- ISSUE DATE: March 1985
- PAGE NUMBER(S): 27-30
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: The problem of the disgruntled employee
- or ex-employee who sabotages a computer system is
- seen as more of a threat than an outside hacker.
-
-
- AUTHOR: Zalud, Bill
-
- TITLE OF ARTICLE: Security and DP Cooperate to
- Attack Computer Crime
-
- NAME OF PERIODICAL: Security
-
- VOLUME OF PERIODICAL: 24
- NUMBER OF PERIODICAL: 10
- ISSUE DATE: October 1987
- PAGE NUMBER(S): 52-56, & 58
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article stresses teamwork as
- computer crime becomes a company fact of life by
- effectively cuts across a number of functional
- areas.
-
- ACCESS CONTROL
-
-
- AUTHOR: Avarne, Simon
-
- TITLE OF ARTICLE: How to Find Out a Password
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 12
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: Spring 1988
- PAGE NUMBER(S): 16-17
- CATEGORY: Access Control
- DESCRIPTION: This article gives examples of how to
- discover someones password and discusses weaknesses
- of traditional passwords.
-
-
- AUTHOR: Betts, M.
-
- TITLE OF ARTICLE: NBS Releases Standards For
- Managing Password Security
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 28
- ISSUE DATE: July 1985
- PAGE NUMBER(S): 19
- CATEGORY: Access Control
-
- DESCRIPTION: This article talks about how the
- National Bureau of Standards has completed a two-
- part publication dealing with password systems.
-
-
- AUTHOR: Bowmen, Terry
-
- TITLE OF ARTICLE: Undercarpet Fiber Optics
-
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 11
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: Spring 1987
- PAGE NUMBER(S): 23-26
- CATEGORY: Access Control
- DESCRIPTION: This article discusses how fiber optics
- offer better security than copper cable undercarpet.
- It also includes how to plan an undercarpet system.
-
-
- AUTHOR: Clyde, Allen R.
-
- TITLE OF ARTICLE: Insider Threat on Automated
- Information Systems
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 11
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: Fall 1987
- PAGE NUMBER(S): 11-14
- CATEGORY: Access Control
- DESCRIPTION: This articles discusses activities to
- detect sources of abuse that are not widely
- implemented.
-
-
-
- AUTHOR: Davidson, Thomas L. and
- White, Clinton E. Jr.
- TITLE OF ARTICLE: How to Improve Network Security
-
- NAME OF PERIODICAL: Infosystems
-
- VOLUME OF PERIODICAL: 30
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: June 1983
- PAGE NUMBER(S): 110-112
- CATEGORY: Access Control
-
- DESCRIPTION: This article discusses the need to
- protect network systems using software locks,
- authorization schemes, logs, and data encryption.
-
-
-
- AUTHOR: Diamond, F.H.
-
- TITLE OF ARTICLE: Computer Network Security: The
- Need Was Never Greater
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL: 102
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: August 1985
- PAGE NUMBER(S): 94-99
- CATEGORY: Access Control
-
- DESCRIPTION: This article discusses the advantages
- of using the callback approach in computer networks
- to prevent hackers from getting onto a system.
-
-
-
- AUTHOR: Fisher, M.J.
-
- TITLE OF ARTICLE: New Security Device "Fingers"
- Culprit
-
- NAME OF PERIODICAL: MIS Week
-
- VOLUME OF PERIODICAL: 6
- NUMBER OF PERIODICAL: 35
- ISSUE DATE: September 1985
- PAGE NUMBER(S): 12
- CATEGORY: Access Control
-
- DESCRIPTION: This article describes a new product
- that uses a fingerprint device to verify a user's
- identity and then allow access on the computer
- system.
-
-
-
- AUTHOR: Horgan, J.
-
- TITLE OF ARTICLE: Thwarting The Information Thiefs
-
- NAME OF PERIODICAL: IEEE Spectrum
-
- VOLUME OF PERIODICAL: 22
- NUMBER OF PERIODICAL: 7
- ISSUE DATE: July 1985
- PAGE NUMBER(S): 30-41
- CATEGORY: Access Control
-
- DESCRIPTION: Many organizations are protecting
- their communication output from electronic
- interception by trying to detect and foil the
- surveillance using a variety of methods.
-
-
- AUTHOR: Jackson, Carl B.
-
- TITLE OF ARTICLE: Passwords: Comments from the
- Information Systems Security
- Association
- NAME OF PERIODICAL: Security
-
- VOLUME OF PERIODICAL: 24
- NUMBER OF PERIODICAL: 7
- ISSUE DATE: July 1987
- PAGE NUMBER(S): 105
- CATEGORY: Access Control
- DESCRIPTION: Discusses relevant security issues and
- how to bring an appropriate degree of LAN
- information security to your organization.
-
-
-
- AUTHOR: Kontur, J.S. and Letham, L.
-
- TITLE OF ARTICLE: Locking Up System Security
-
-
- NAME OF PERIODICAL: Electronic Week
-
- VOLUME OF PERIODICAL: 58
- NUMBER OF PERIODICAL: 7
- ISSUE DATE: February 18, 1985
- PAGE NUMBER(S): 68-72
- CATEGORY: Access Control
-
- DESCRIPTION: This article describes a system that
- cannot be broken into by unauthorized users. It uses
- a random-number generator and encryption logic.
-
-
-
- AUTHOR: Korzeniowski, P.
-
- TITLE OF ARTICLE: Security Dynamics Releases Two-
- Part Security System
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 42
- ISSUE DATE: October 1985
- PAGE NUMBER(S): 19, 23
- CATEGORY: Access Control
-
- DESCRIPTION: This article discusses a product
- Security Dynamics has designed that is an
- inexpensive security protection device which keeps
- hackers out of systems.
-
-
- AUTHOR: McCarthy, Charles J.
-
- TITLE OF ARTICLE: Passwords
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 10
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: Fall 1986
- PAGE NUMBER(S): 13-14
- CATEGORY: Access Control
- DESCRIPTION: This article discusses the two primary
- password configurations passwords defined by user,
- and passwords assigned to a user. It shows the
- differences between these two from a security view.
-
-
- AUTHOR: Meason, Robert
-
- TITLE OF ARTICLE: System Security at the Terminal
-
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 10
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: Fall 1986
- PAGE NUMBER(S): 16-17
- CATEGORY: Access Control
- DESCRIPTION: This article discusses considerations
- of MIS management protection of the processor from
- access by unauthorized users.
-
-
- AUTHOR: Muzerall, Joseph V. and Carty, Thomas J.
-
- TITLE OF ARTICLE: COMSEC and Its Need for Key
- Management
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 11
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: Spring 1987
- PAGE NUMBER(S): 11-14
- CATEGORY: Access Control
- DESCRIPTION: This article explains the establishment
- of a standard set of protection mechanisms for both
- the classified and private user communities.
-
-
- AUTHOR: Schiller, Michael
-
- TITLE OF ARTICLE: Security at the Touch of a
- Finger
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: July/August 1985
- PAGE NUMBER(S): 15-17
- CATEGORY: Access Control
- DESCRIPTION: This article discusses using biometric
- security systems for high-tech solutions to access
- control problems.
-
-
- AUTHOR: Schmonsees, Robert J.
-
- TITLE OF ARTICLE: Identification and Authentication:
- The Security Challenge of the 80's
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April, 1985
- PAGE NUMBER(S): 22-23
- CATEGORY: Access Control
- DESCRIPTION: This article discusses the computer
- security issues of identification and authentication
- showing the common problems and offering some
- suggestions for improving by random passcode.
-
-
- AUTHOR: Stieglitz, M.
-
- TITLE OF ARTICLE: Security For Shared Resources
-
- NAME OF PERIODICAL: Micro Communications
-
- VOLUME OF PERIODICAL: 2
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: June 1985
- PAGE NUMBER(S): 19-26
- CATEGORY: Access Control
-
- DESCRIPTION: This article discusses data security
- products and procedures for network use. Includes
- description of encryption techniques that are now
- popular.
-
-
-
- AUTHOR: Wood, Charles Cresson
-
- TITLE OF ARTICLE: A New Approach to Computer User
- Authentication
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 10
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: Fall 1986
- PAGE NUMBER(S): 21-26
- CATEGORY: Access Control
- DESCRIPTION: This article gives a new approach to
- authentication called dial-guard. It addresses the
- two problems of password/users IDs not providing
- sufficient security and identifying the location of
- dial-up users.
-
-
-
- AUTHOR: Wood, Charles Cresson
-
- TITLE OF ARTICLE: Information Security with
- One-Way Functions
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May/June 1985
- PAGE NUMBER(S): 14-16
- CATEGORY: Access Control
- DESCRIPTION: This article explains how one-way
- functions can be used to safeguard information that
- is too sensitive to be protected via encryption.
-
-
- AUDIT AND EVALUATION
-
- AUTHOR: Berman, A.
-
- TITLE OF ARTICLE: Evaluating On-Line Computer
- Security
-
- NAME OF PERIODICAL: Data Communications
-
- VOLUME OF PERIODICAL: 12
- NUMBER OF PERIODICAL: 7
- ISSUE DATE: July 1983
- PAGE NUMBER(S): 145-152
- CATEGORY: Audit and Evaluation
-
- DESCRIPTION: The security problems that have arisen
- because of on-line processing are discussed in this
- article. Covered are the two ways to obtain a secure
- on-line system.
-
-
- AUTHOR: Betts, M.
-
- TITLE OF ARTICLE: U.S. Agency Faces Probes, Boosts
- Security After Audit
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 24
- ISSUE DATE: June 1985
- PAGE NUMBER(S): 8
- CATEGORY: Audit and Evaluation
-
- DESCRIPTION: This article discusses an audit report
- issued by the inspector general of the U.S.
- Department of the Interior in March 1985 which
- revealed inadequate controls over passwords, faulty
- operating procedures, and lack of audit trails by
- the Denver Service Center.
-
-
- AUTHOR: Bologna, Jack
-
- TITLE OF ARTICLE: Forensic Accounting
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: July/August 1984
- PAGE NUMBER(S): 16-20
- CATEGORY: Audit and Evaluation
- DESCRIPTION: This article identifies the skills and
- competency of a forensic accountant.
-
-
- AUTHOR: Flach, Joseph P.
-
- TITLE OF ARTICLE: Increasing Programming Efficiency
- While Preventing the "F" Word
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 11
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: Fall 1987
- PAGE NUMBER(S): 15-17
- CATEGORY: Audit and Evaluation
- DESCRIPTION: This article gives examples of ways
- to identify fraudulent code in a production program.
-
-
- AUTHOR: Gaydasch, Alexander
-
- TITLE OF ARTICLE: Postimplementation Audits -
- A Quick, Easy Approach
-
- NAME OF PERIODICAL: Data Management
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: February 1983
- PAGE NUMBER(S): 54, 55, 69
- CATEGORY: Audit and Evaluation
-
- DESCRIPTION: This article describes post-
- implementation audits and how they help to determine
- whether a computer system has met its original
- criteria.
-
-
-
- CONTINGENCY PLANNING
-
-
- AUTHOR: Cabell, D.
-
- TITLE OF ARTICLE: Network Backups
-
- NAME OF PERIODICAL: Micro Communications
-
- VOLUME OF PERIODICAL: 2
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: June 1985
- PAGE NUMBER(S): 14-18
- CATEGORY: Contingency Planning
-
- DESCRIPTION: This article describes how the only way
- to protect a LAN, micro, mini, or mainframe from a
- complete system crash is adequate backup.
-
-
- AUTHOR: Ciura, J.M.
-
- TITLE OF ARTICLE: Vital Records Protection:
- Identifying Essential
- Information
- NAME OF PERIODICAL: Information Management
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: February 1985
- PAGE NUMBER(S): 11
- CATEGORY: Contingency Planning
-
- DESCRIPTION: This article suggest that the best way
- to resume business activity after an emergency or
- disaster is to have a vital records protection
- program.
-
-
- AUTHOR: Clauss, Karl H.
-
- TITLE OF ARTICLE: How To Move A Data Center and
- Avoid a Disaster
-
- NAME OF PERIODICAL: Infosystems
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: December 1981
- PAGE NUMBER(S): 46-48, 50
- CATEGORY: Contingency Planning
-
- DESCRIPTION: This article describes how ARCO Oil
- and Gas Company moved their computer center to a new
- location and the points a company should consider
- when moving a data center.
-
-
- AUTHOR: Dobberstein, M.
-
- TITLE OF ARTICLE: To Have and Not to Have a
- Disaster
-
- NAME OF PERIODICAL: Computer Decisions
-
- VOLUME OF PERIODICAL: 17
- NUMBER OF PERIODICAL: 18
- ISSUE DATE: September 1985
- PAGE NUMBER(S): 102-126
- CATEGORY: Contingency Planning
-
- DESCRIPTION: This article deals with the importance
- of actually testing contingency plans to see if they
- work.
-
-
- AUTHOR: Minoli, D.
-
- TITLE OF ARTICLE: Backup Needs Merit Special
- Attention
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 15
- ISSUE DATE: April 1985
- PAGE NUMBER(S): 91, 96
- CATEGORY: Contingency Planning
-
- DESCRIPTION: This article focuses on the merits of
- backing up a data center to prevent a major disaster
- from critically affecting a company.
-
-
-
- AUTHOR: Pujals, J.M.
-
- TITLE OF ARTICLE: What is a Contingency Plan?
-
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 12
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: Winter 1988
- PAGE NUMBER(S): 19-23
- CATEGORY: Contingency Planning
- DESCRIPTION: This article tells how to construct a
- contingency plan and goes over the major mandatory
- steps that have to be taken to end up with a
- workable product.
-
-
- AUTHOR: Raimondi, D.
-
- TITLE OF ARTICLE: E.F. Hutton Underscores
- Practicality in Backup Plan
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 15
- ISSUE DATE: April 1985
- PAGE NUMBER(S): 19
- CATEGORY: Contingency Planning
-
- DESCRIPTION: Describes how E.F. Hutton has built a
- new computer room as part of its disaster recovery
- plan.
-
-
- AUTHOR: Rames, David
-
- TITLE OF ARTICLE: Recovering From Disasters
-
- NAME OF PERIODICAL: Computer Decisions
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: September 1981
- PAGE NUMBER(S): 108-110, 112, 114, 120, 122, 124,
- 126-131, 188-189
- CATEGORY: Contingency Planning
-
- DESCRIPTION: Described in this article are criteria
- for developing an emergency backup plan and examples
- of emergency backup alternatives.
-
-
-
- AUTHOR: Scoma, Louis
-
- TITLE OF ARTICLE: How Secure Is Your Computer
- Operation From A Disaster
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: August 1981
- PAGE NUMBER(S): 96, 98
- CATEGORY: Contingency Planning
-
- DESCRIPTION: The failures of companies to protect
- their computer centers is discussed along with the
- need for recovery systems to serve as backup
- security.
-
-
-
- AUTHOR: Wolbrecht, J.E.
-
- TITLE OF ARTICLE: Can Your Records Storage Center
- Stand a Disaster
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL: 102
- NUMBER OF PERIODICAL: 3
- ISSUE DATE: September 1985
- PAGE NUMBER(S): 112-113
- CATEGORY: Contingency Planning
-
- DESCRIPTION: A manager's responsibility to protect
- a records storage center by recognizing vulnerable
- areas and making them more secure is discussed.
-
-
- DATABASE MANAGEMENT
-
-
- AUTHOR: Pieper, Oscar R.
-
- TITLE OF ARTICLE: Voice Authentication Wages A War
- on Data Base Fraud
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: July/August 1984
- PAGE NUMBER(S): 12-13
- CATEGORY: Data Base Security
- DESCRIPTION: This article reviews the present state
- of voice authentication technology and how it
- applies to secure data bases from bogus intruders.
-
-
- ENVIRONMENTAL SECURITY
-
-
- AUTHOR: Lemke, Fred H.
-
- TITLE OF ARTICLE: Blackouts and Computer Power
- Protection
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 12
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: Spring 1988
- PAGE NUMBER(S): 19-23
- CATEGORY: Environmental Security
- DESCRIPTION: This article is a study that was taken
- to see emerging patterns of blackouts that may be
- useful in helping evaluate your level of blackout
- vulnerability and then set up appropriate levels of
- power protection for your electronic systems.
-
-
-
- AUTHOR: Lemke, Fred H.
-
- TITLE OF ARTICLE: Computer Power Protection
-
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April 1984
- PAGE NUMBER(S): 31-33
- CATEGORY: Environmental Security
- DESCRIPTION: This article gives examples of how to
- protect your facility against the harmful effects of
- an electrical power outage.
-
-
- AUTHOR: McGowan, Kevin J.
-
- TITLE OF ARTICLE: Computer Power Protection
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May/June 1985
- PAGE NUMBER(S): 21-25
- CATEGORY: Environmental Security
- DESCRIPTION: This article looks at understanding
- AC power conditions in data processing site
- preparation and its criticality for preventing
- future computer downtime and disruptions.
-
-
-
- GENERAL SECURITY
-
-
- AUTHOR: Beitman, L.
-
- TITLE OF ARTICLE: A Practical Guide To Small
- Business Computer Security
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL: 96
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: August 1982
- PAGE NUMBER(S): 86, 90
- CATEGORY: General Security
-
- DESCRIPTION: This article gives advice on how to
- obtain computer security in a small business
- environment. A checklist is included that will help
- to prevent accidental and intentional harm to a
- system.
-
-
- AUTHOR: Collins, J.A.
-
- TITLE OF ARTICLE: Continuous Security Control
- Clamps Down on Abuse
-
- NAME OF PERIODICAL: Data Management
-
- VOLUME OF PERIODICAL: 23
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May 1985
- PAGE NUMBER(S): 56-59
- CATEGORY: General Security
-
- DESCRIPTION: The need for computer access is
- discussed in this article that suggest that such
- access should be a management, security-oriented
- process. Computer security guidelines are also
- given.
-
-
- AUTHOR: Coontz, Constance
-
- TITLE OF ARTICLE: Protection through Isolation
-
- NAME OF PERIODICAL: Security Management
-
- VOLUME OF PERIODICAL: 31
- NUMBER OF PERIODICAL: 11
- ISSUE DATE: November 1987
- PAGE NUMBER(S): 53-55
- CATEGORY: General Security
- DESCRIPTION: This article discusses
- compartmentalizing valuable data on dedicated PCs or
- small computer systems to help protect it from
- hackers and moles.
-
-
- AUTHOR: Gazarek, Kenneth F.
-
- TITLE OF ARTICLE: Cabinets for Electromagnetic
- Interference/Radio-Frequency Interference and
- TEMPEST Shielding
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: July/August 1985
- PAGE NUMBER(S): 12-13
- CATEGORY: General Security
- DESCRIPTION: This article discusses the
- electromagnetic interference and radio-frequency
- interference control options, designing and building
- metal cabinets that provide effective shielding.
-
-
-
- AUTHOR: Lobel, J.
-
- TITLE OF ARTICLE: Third Decade of Concern
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 16
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: February 8, 1982
- PAGE NUMBER(S): 1D/31-34 & 36
- CATEGORY: General Security
-
- DESCRIPTION: The author looks at some of the issues
- associated with distributed data processing
- including privacy, crime, and security.
-
-
- AUTHOR: Miskiewicz, J.
-
- TITLE OF ARTICLE: DP Security: A Delicate Balance
-
- NAME OF PERIODICAL: Computer Decisions
-
- VOLUME OF PERIODICAL: 17
- NUMBER OF PERIODICAL: 8
- ISSUE DATE: April 1985
- PAGE NUMBER(S): 104-106
- CATEGORY: General Security
-
- DESCRIPTION: This article discusses the delicate
- balance between protecting vital resources in a data
- processing facility and enhancing productivity.
-
-
- AUTHOR: Moulton, R.
-
- TITLE OF ARTICLE: Prevention: Better Than
- Prosecution
-
- NAME OF PERIODICAL: Government Data Systems
-
- VOLUME OF PERIODICAL: 10
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: November/December 1981
- PAGE NUMBER(S): 20 & 22-23
- CATEGORY: General Security
-
- DESCRIPTION: The focus of this paper is on
- deterrence of computer abuse, whether it is
- unintentional or intentional.
-
-
- AUTHOR: Parker, D.B.
-
- TITLE OF ARTICLE: The Many Faces of Data
- Vulnerability
-
- NAME OF PERIODICAL: IEEE Spectrum
-
- VOLUME OF PERIODICAL: 21
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May 1984
- PAGE NUMBER(S): 46-49
- CATEGORY: General Security
-
- DESCRIPTION: Discussed in this paper are both the
- need for new computer security methods and the
- attainable limits that can be reached by computer
- security.
-
-
-
- AUTHOR: Rosch, W.
-
- TITLE OF ARTICLE: Three Products Help Cork Computer
- Leaks, Feature Blocked Access,
- Disk-File Encryption
- NAME OF PERIODICAL: PC Week
-
- VOLUME OF PERIODICAL: 2
- NUMBER OF PERIODICAL: 18
- ISSUE DATE: May 1985
- PAGE NUMBER(S): 122-124
- CATEGORY: General Security
-
- DESCRIPTION: This article discusses a trio of
- products to help prevent unauthorized access to a
- computer system.
-
-
-
-
-
-
- AUTHOR: Rosen, Richard D. and Dvorsky, James
-
- TITLE OF ARTICLE: Portable Data Carrier Technology
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 12
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: Winter 1988
- PAGE NUMBER(S): 9-19
- CATEGORY: General Security
- DESCRIPTION: This article presents an overview of
- the general field of portable data carrier
- technology. Included are not only smart cards but
- other devices and systems that are beginning to
- emerge in the marketplace.
-
-
- AUTHOR: Srinivasan, C.A. and Dascher, P.E.
-
- TITLE OF ARTICLE: Computer Security and Integrity:
- Problems and Prospects
-
- NAME OF PERIODICAL: Infosystems
-
- VOLUME OF PERIODICAL: 28
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May 1981
- PAGE NUMBER(S): 5 Pages
- CATEGORY: General Security
-
- DESCRIPTION: Various aspects of computer security
- are discussed including data security, data privacy,
- data integrity, etc.
-
-
- AUTHOR: Weller, Reginald H.
-
- TITLE OF ARTICLE: Off-Site Data Storage: A Changing
- Industry
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May/June 1985
- PAGE NUMBER(S): 18-20
- CATEGORY: General Security
- DESCRIPTION: This article discusses selecting a
- backup site while meeting the criteria of integrity,
- reliability, access, reasonable cost, appropriate
- location, good security, and comprehensive insurance
- coverage.
-
-
-
- AUTHOR: Wright, J.R. Jr.
-
- TITLE OF ARTICLE: User Responsibility for Security
-
- NAME OF PERIODICAL: Government Data Systems
-
- VOLUME OF PERIODICAL: 15
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: December 1985 through January 1986
- PAGE NUMBER(S): 52-55
- CATEGORY: General Security
-
- DESCRIPTION: This article looks at the circular
- "Management of Federal Information Resources"
- printed by the Office of Management and Budget.
- This circular provides guidance to Federal Managers
- concerning computer security and the associated
- responsibilities.
-
-
- AUTHOR: Zimmerman, J.S.
-
- TITLE OF ARTICLE: Is Your Computer Insecure?
-
- NAME OF PERIODICAL: Datamation
-
- VOLUME OF PERIODICAL: 31
- NUMBER OF PERIODICAL: 10
- ISSUE DATE: May 1985
- PAGE NUMBER(S): 119-120
- CATEGORY: General Security
-
- DESCRIPTION: This article challenges widely
- accepted notions concerning computer security. It
- suggest that people's views should be changed so
- that the challenge will be making a security system
- work instead of beating it.
-
- LAW AND ETHICS
-
-
- AUTHOR: Bequai, August
-
- TITLE OF ARTICLE: Federal Computer Crime
- Legislation is Needed
-
- NAME OF PERIODICAL: Data Management
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: May 1981
- PAGE NUMBER(S): 22-24
- CATEGORY: Law & Ethics
-
- DESCRIPTION: The ways criminals use loopholes in
- our present criminal justice system is discussed
- along with a history of computer crime legislation.
-
-
- AUTHOR: Betts, M.
-
- TITLE OF ARTICLE: Reagan Systems Security
- Directive Under Attack
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 27
- ISSUE DATE: July 1985
- PAGE NUMBER(S): 1
- CATEGORY: Law & Ethics
-
- DESCRIPTION: This article discusses why members of
- congress are concerned over how the National
- Security Decision Directive 145 on computer security
- could be abused by military and intelligence
- officials.
-
-
-
- AUTHOR: Bigelow, R.P.
-
- TITLE OF ARTICLE: Computer Security And Law
-
- NAME OF PERIODICAL: Infosystems
-
- VOLUME OF PERIODICAL: 29
- NUMBER OF PERIODICAL: 12
- ISSUE DATE: December 1982
- PAGE NUMBER(S): 84
- CATEGORY: Law & Ethics
-
- DESCRIPTION: This article looks at how a memo from
- the legal department should be structured concerning
- the protection of assets.
-
-
- AUTHOR: Hagopian, Greg
-
- TITLE OF ARTICLE: Planning and Implementing a
- Security Package
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 10
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: Fall 1986
- PAGE NUMBER(S): 17-20
- CATEGORY: Law & Ethics
- DESCRIPTION: This article discusses vendor selection
- and legal issues.
-
-
-
- AUTHOR: Roberts, J.E.
-
- TITLE OF ARTICLE: Filing Software Copyrights
-
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 36
- ISSUE DATE: September 1985
- PAGE NUMBER(S): 116
- CATEGORY: Law & Ethics
-
- DESCRIPTION: This article describes how copyrighting
- software is accomplished and what copyrighted
- software means.
-
-
-
- MICROCOMPUTER SECURITY
-
- AUTHOR: Koelle, Jim
-
- TITLE OF ARTICLE: What's in the Cards?
-
-
- NAME OF PERIODICAL: Security
-
- VOLUME OF PERIODICAL: 23
- NUMBER OF PERIODICAL: 12
- ISSUE DATE: December 1986
- PAGE NUMBER(S): 42-44, and 46
- CATEGORY: Microcomputer Security
- DESCRIPTION: This article discusses microchips and
- how they promise to revolutionize access card
- technology with fast, calculating, and advanced
- memories.
-
-
- AUTHOR: Rhodes, B.
-
- TITLE OF ARTICLE: Micro Security That Makes Sense
-
-
- NAME OF PERIODICAL: Computer Decisions
-
- VOLUME OF PERIODICAL: 17
- NUMBER OF PERIODICAL: 9
- ISSUE DATE: May 1985
- PAGE NUMBER(S): 72, 74-76
- CATEGORY: Microcomputer Security
-
- DESCRIPTION: This article describes security
- procedures that can be used by employees to solve
- microcomputer security problems.
-
-
-
- AUTHOR: Zimmerman, J.S.
-
- TITLE OF ARTICLE: P.C. Security: So What's New
-
- NAME OF PERIODICAL: Datamation
-
- VOLUME OF PERIODICAL: 31
- NUMBER OF PERIODICAL: 21
- ISSUE DATE: November 1985
- PAGE NUMBER(S): 89-92
- CATEGORY: Microcomputer Security
-
- DESCRIPTION: This article looks at the problems
- data security officers are going to encounter even
- as they implement safeguards for micros.
-
-
- PHYSICAL SECURITY AND HARDWARE
-
-
- AUTHOR: Call, B.
-
- TITLE OF ARTICLE: Buttress Against Computer
- Crime
-
- NAME OF PERIODICAL: PC Week
-
- VOLUME OF PERIODICAL: 2
- NUMBER OF PERIODICAL: 18
- ISSUE DATE: May 1985
- PAGE NUMBER(S): 111, 115
- CATEGORY: Physical Security & Hardware
-
- DESCRIPTION: The physical protection of computers is
- becoming an area of interest for more organizations.
- The increased number of physical security devices
- illustrates this point and is discussed in this
- article.
-
-
-
- AUTHOR: Epner, S.A.
-
- TITLE OF ARTICLE: Computer Security: Plenty of
- Questions but No Easy Answers
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL: 101
- NUMBER OF PERIODICAL: 3
- ISSUE DATE: March 1985
- PAGE NUMBER(S): 74-76
- CATEGORY: Physical Security & Hardware
-
- DESCRIPTION: This article covers the physical
- security of computer equipment including air
- conditioning and power to pass cards and security
- guards.
-
-
-
- PRIVACY
-
-
- AUTHOR: Jordan, Halmuth
-
- TITLE OF ARTICLE: The Search for Privacy
-
-
- NAME OF PERIODICAL: Security Management
-
- VOLUME OF PERIODICAL: 31
- NUMBER OF PERIODICAL: 11
- ISSUE DATE: November 1987
- PAGE NUMBER(S): 32-36
- CATEGORY: Privacy
- DESCRIPTION: This article focuses on some of the
- difficulties the legal profession is having by
- looking at American and West German law regarding
- electronic surveillance.
-
- RISK MANAGEMENT
-
- AUTHOR: Armstrong, James R.
-
- TITLE OF ARTICLE: Protecting the Corporate Data
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April, 1985
- PAGE NUMBER(S): 16-17
- CATEGORY: Risk Management
- DESCRIPTION: This article discusses how most
- alternative off-site lack the environmental control,
- security and accessibility needed. Includes a
- discussion on things to consider in selecting an
- off-site storage facility.
-
-
- AUTHOR: Bologna, Jack
-
- TITLE OF ARTICLE: Disaster/Recovery Planning: A
- Qualitative Approach
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April 1984
- PAGE NUMBER(S): 11-15
- CATEGORY: Risk Management
- DESCRIPTION: Developing a disaster/recovery plan
- usually involves a detailed quantitative risk
- analysis; the author offers a more qualitative
- approach that is less time consuming and will obtain
- a higher level of commitment from management, D/P
- staff, and users.
-
-
-
- AUTHOR: Bologna, Jack
-
- TITLE OF ARTICLE: Industrial Security In a
- Nutshell: A Risk by any Other
- Name
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May/June 1985
- PAGE NUMBER(S): 12-13
- CATEGORY: Risk Management
- DESCRIPTION: This article discusses properly
- understanding risk and how the opposite side of risk
- is opportunity for growth and development.
-
-
- AUTHOR: Bologna, Jack
-
- TITLE OF ARTICLE: Risk Assessment Guidelines for
- Fidelity Insurance
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April, 1985
- PAGE NUMBER(S): 18-20
- CATEGORY: Risk Management
- DESCRIPTION: This article is a review of the
- adequacy of asset protection plans, policies,
- procedures and controls to enlighten top management.
-
-
-
- AUTHOR: Helsing, Cherly W.
-
- TITLE OF ARTICLE: Disaster Recovery Options
-
- NAME OF PERIODICAL: Security
-
- VOLUME OF PERIODICAL: 24
- NUMBER OF PERIODICAL: 7
- ISSUE DATE: July 1987
- PAGE NUMBER(S): 100-103
- CATEGORY: Risk Management
- DESCRIPTION: This article has suggestions on how to
- find a recovery plan that fits your firm without
- damaging your profits.
-
-
-
- AUTHOR: Linden, Jack
-
- TITLE OF ARTICLE: Automated EDP Risk Analysis
- and Management
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: September/October 1984
- PAGE NUMBER(S): 16-18
- CATEGORY: Risk Management
- DESCRIPTION: This article gives a cost effective
- first step in developing a successful computer
- security program using a cost benefit analysis
- approach.
-
-
-
- AUTHOR: Schweig, Barry B.
-
- TITLE OF ARTICLE: Decision Matrix: A Risk Handling
- Decision Aid
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April 1984
- PAGE NUMBER(S): 16-18
- CATEGORY: Risk Management
- DESCRIPTION: This article discusses conceptualizing
- a decision-matrix as an integral component of a risk
- management process.
-
-
- AUTHOR: Vernick, Paul R.
-
- TITLE OF ARTICLE: Providing Data Processing
- Recovery Backup
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April, 1985
- PAGE NUMBER(S): 14-16
- CATEGORY: Risk Management
- DESCRIPTION: This article covers some of the major
- emergency and recovery planning options available
- that need to be considered prior to the occurrence
- of any serious emergency.
-
-
- SECURITY MANAGEMENT
-
-
- AUTHOR: Bologna, Jack
-
- TITLE OF ARTICLE: Security Planning: The "Tapps"
- Method
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 10
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: Fall 1986
- PAGE NUMBER(S): 7-11
- CATEGORY: Security Management
- DESCRIPTION: This article covers a system approach
- to assets protection. It discusses an analytical
- process called Total Assets Protection Planning
- System (TAPPS) which consist of organization,
- structure and mandate of the security function.
-
-
-
- AUTHOR: Bologna, Jack
-
- TITLE OF ARTICLE: Selling Computer Security to
- Top Management
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May/June 1984
- PAGE NUMBER(S): 13-16
- CATEGORY: Security Management
- DESCRIPTION: This article discusses positive
- motivational impact, minimizing risk, and cost
- feasibility in selling computer security to top
- managers.
-
-
-
- AUTHOR: Bologna, Jack
-
- TITLE OF ARTICLE: Why the Corporate Security
- Function is Being Downsized
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 11
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: Spring 1987
- PAGE NUMBER(S): 20-21
- CATEGORY: Security Management
- DESCRIPTION: This article discusses the disbanding
- and dilution of corporate security functions and
- how this effects the security of a firm.
-
-
- AUTHOR: Goldstein, Bruce
-
- TITLE OF ARTICLE: Information Security: The
- Information Resource Management
- Approach
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May/June 1984
- PAGE NUMBER(S): 18-22
- CATEGORY: Security Management
- DESCRIPTION: This article addresses information as
- a asset that must be protected as any other asset.
- It also discusses information research management
- providing the framework for a comprehensive
- information security program.
-
-
-
- AUTHOR: Harris, N.L.
-
- TITLE OF ARTICLE: Rigid Administrative Procedures
- Prevent Computer Security
- Failure
- NAME OF PERIODICAL: Data Management
-
- VOLUME OF PERIODICAL: 22
- NUMBER OF PERIODICAL: 12
- ISSUE DATE: December 1984
- PAGE NUMBER(S): 13-14, 16
- CATEGORY: Security Management
-
- DESCRIPTION: The best way to keep a security program
- from failing is the use of strict administrative
- procedures. This article also discusses why some
- systems fail.
-
-
-
- AUTHOR: Reber, Jan
-
- TITLE OF ARTICLE: The Essence of Industrial
- Espionage
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 10
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: Winter 1986
- PAGE NUMBER(S): 24-25
- CATEGORY: Security Management
- DESCRIPTION: This article discusses understanding
- espionage by a characteristic all spies have in
- common "access to the target".
-
- SOFTWARE AND OPERATING SYSTEM SECURITY
-
-
- AUTHOR: Adler, Stacy
-
- TITLE OF ARTICLE: 7 Myths of Computer Security
-
- NAME OF PERIODICAL: Security
-
- VOLUME OF PERIODICAL: 24
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: January 1987
- PAGE NUMBER(S): 50-52
- CATEGORY: Software & Operating System Security
- DESCRIPTION: This article covers consultants that
- clear misconceptions about data protection software.
-
-
-
- AUTHOR: Edwards, J.
-
- TITLE OF ARTICLE: Ends in Sight for the
- Copy-Protection Debate
-
- NAME OF PERIODICAL: PC Week
-
- VOLUME OF PERIODICAL: 3
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: January 1986
- PAGE NUMBER(S): 101 & 105
- CATEGORY: Software & Operating System Security
-
- DESCRIPTION: This protection of software from
- unauthorized use may be coming to an end as
- Microsoft Corporation has decided to lift the
- protection from several of its software programs.
-
-
-
- AUTHOR: Koreniowski, P.
-
- TITLE OF ARTICLE: Adapso Making Progress on
- Software Protection Device
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 24
- ISSUE DATE: June 1985
- PAGE NUMBER(S): 8
- CATEGORY: Software & Operating System Security
-
- DESCRIPTION: This article discusses how the
- Association of Data Processing Service Organizations
- (ADAPSO) is getting ready to announce its progress
- in creating a software authorization mechanism.
-
-
-
- AUTHOR: Schriever, Joe F.
-
- TITLE OF ARTICLE: Structuring for Security
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: September/October 1984
- PAGE NUMBER(S): 14-16
- CATEGORY: Software & Operating System Security
- DESCRIPTION: This article is a set of guidelines
- that will remove ambiguities as to what will be
- done by whom to provide system security.
-
-
-
- TRAINING AND AWARENESS
-
-
- AUTHOR: Bezdek, J.
-
- TITLE OF ARTICLE: Across-the-Board Training
- Protects Data
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 18
- NUMBER OF PERIODICAL: 44
- ISSUE DATE: October 1984
- PAGE NUMBER(S): SR-10
- CATEGORY: Training & Awareness
-
- DESCRIPTION: This special report covers the four
- areas that a training program in computer security
- needs to include. These are plant physical security,
- logical security, administrative security, and the
- legal and social aspects of security training.
-
-
-
- AUTHOR: Bound, W.A.J.
-
- TITLE OF ARTICLE: Security Protecting Information
- Resources and Media
-
- NAME OF PERIODICAL: Information Management
-
- VOLUME OF PERIODICAL: 18
- NUMBER OF PERIODICAL: 8
- ISSUE DATE: August 1984
- PAGE NUMBER(S): 18-19
- CATEGORY: Training & Awareness
-
- DESCRIPTION: This article discusses what a manager
- must consider when designing an office security
- program to protect against the four vulnerabilities
- of a system: personnel, physical, administrative,
- and technical.
-
-
- AUTHOR: Johnston, R.E.
-
- TITLE OF ARTICLE: What You Need To Know
-
- NAME OF PERIODICAL: Infosystems
-
- VOLUME OF PERIODICAL: 32
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: January 1985
- PAGE NUMBER(S): 56
- CATEGORY: Training & Awareness
-
- DESCRIPTION: Outlined in this article are those
- things that should be considered when establishing
- a computer security program or updating an existing
- program.
-
-
-
- AUTHOR: Leuser, K.G.
-
- TITLE OF ARTICLE: Security Programs: Only as
- Good as We Make Them
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL: 100
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: August 1984
- PAGE NUMBER(S): 91-92
- CATEGORY: Training & Awareness
-
- DESCRIPTION: Discusses how an effective security
- program helps to foil or discourage people with
- dishonest intentions. Looks at the office
- administrator's domain to identify areas of
- potential vulnerability.
-
-
- AUTHOR: Weber, A.
-
- TITLE OF ARTICLE: Effective Security Programs
- Start with Awareness
-
- NAME OF PERIODICAL: Data Management
-
- VOLUME OF PERIODICAL: 23
- NUMBER OF PERIODICAL: 11
- ISSUE DATE: November 1985
- PAGE NUMBER(S): 34-35
- CATEGORY: Training & Awareness
-
- DESCRIPTION: Educating end users is the key to
- helping prevent crime and computer abuse in an
- organization.
-
-
-
- AUTHORS NOT SPECIFIED
-
- ABUSE/MISUSE/CRIME
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Computer "Hacking" is No Longer
- Just a Lark
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL: 102
- NUMBER OF PERIODICAL: 3
- ISSUE DATE: September 1985
- PAGE NUMBER(S): 90-95
- CATEGORY: Abuse/Misuse/Crime
-
- DESCRIPTION: Computer hackers will use computers to
- obtain information and resell it, use it for
- blackmail, extortion, and espionage. This article
- discusses techniques for preventing hackers from
- getting on a system, and monitoring them if they are
- discovered.
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Computer Security: The Menace
- is Human Error
-
- NAME OF PERIODICAL: Office
-
- VOLUME OF PERIODICAL: 99
- NUMBER OF PERIODICAL: 3
- ISSUE DATE: March 1984
- PAGE NUMBER(S): 119-120
- CATEGORY: Abuse/Misuse/Crime
-
- DESCRIPTION: This article stresses that managers
- should understand that data security is a people
- problem and not a computer problem. People are the
- ones that either accidentally or intentionally
- misuse a computer system.
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Internal Security
-
- NAME OF PERIODICAL: PC Week
-
- VOLUME OF PERIODICAL: 2
- NUMBER OF PERIODICAL: 18
- ISSUE DATE: May 1985
- PAGE NUMBER(S): 89-91, 106-107
- CATEGORY: Abuse/Misuse/Crime
-
- DESCRIPTION: Experts feel that local computer access
- is more prone to intrusion than long-distance
- access. This article discusses how insiders in a
- company are the ones most likely to abuse a computer
- system.
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Reporting Computer Crime
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: July/August 1984
- PAGE NUMBER(S): 20-21
- CATEGORY: Abuse/Misuse/Crime
- DESCRIPTION: This article presents a suggested
- format for a final report to use in documenting
- actions surrounding a computer crime.
-
-
-
- ACCESS CONTROL
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Communications and Systems
- Security
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 3
- ISSUE DATE: 1985 Buyer's Directory
- PAGE NUMBER(S): 11-13
- CATEGORY: Access Control
- DESCRIPTION: This article discusses a wide variety
- of communications and system security protection
- methods. Includes encryption, fiber optics, key
- management, optical links, electrical emanations,
- and dial-up access protection devices.
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Computer Communications
- Security Lexicon
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 11
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: Spring 1987
- PAGE NUMBER(S): 22-23
- CATEGORY: Access Control
- DESCRIPTION: This article is an update containing
- some new added security definitions of terms and
- phrases.
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Controlling Access To Your Data
-
- NAME OF PERIODICAL: Personal Computing
-
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 9
- ISSUE DATE: September 1985
- PAGE NUMBER(S): 60-72
- CATEGORY: Access Control
-
- DESCRIPTION: Explains measures that can be taken
- to protect what's in a computer. Focuses not only
- on vandals, but also on people who accidentally harm
- the computer.
-
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Dial-Up Access Security Products
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 2
- ISSUE DATE: November/December 1984
- PAGE NUMBER(S): 21-24
- CATEGORY: Access Control
- DESCRIPTION: This article presents some new dial-up
- access security products and their major features.
-
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Enhancements Out For Barrier
- Security Devices
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 18
- NUMBER OF PERIODICAL: 35
- ISSUE DATE: August 1984
- PAGE NUMBER(S): 51
- CATEGORY: Access Control
-
- DESCRIPTION: This article discusses the password
- protection device designed by International Anasazi,
- Inc. that will limit access on dial-up lines.
-
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Firesign Unwraps Security
- Feature
-
- NAME OF PERIODICAL: MIS Week
-
- VOLUME OF PERIODICAL: 5
- NUMBER OF PERIODICAL: 23
- ISSUE DATE: June 1984
- PAGE NUMBER(S): 24
- CATEGORY: Access Control
-
- DESCRIPTION: This article discusses Firesign
- Computer Company's product that provides for network
- security by its password system.
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Security Computer Outsmarts
- Colorado Bandits
-
- NAME OF PERIODICAL: Data Management
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 7
- ISSUE DATE: July 1981
- PAGE NUMBER(S): 17-18
- CATEGORY: Access Control
-
- DESCRIPTION: This article looks at the effectiveness
- of a security system that controls access to several
- high-rise buildings in Colorado.
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Security Lock Ready for PCs
-
- NAME OF PERIODICAL: MIS Week
-
- VOLUME OF PERIODICAL: 6
- NUMBER OF PERIODICAL: 26
- ISSUE DATE: July 1985
- PAGE NUMBER(S): 30
- CATEGORY: Access Control
-
- DESCRIPTION: The hard disk security product "Knight
- Data Security Manager" is discussed. This product
- allows password protection in a PC.
-
-
-
- CONTINGENCY PLANNING
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Automated Contingency Planning
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April 1984
- PAGE NUMBER(S): 22
- CATEGORY: Contingency Planning
- DESCRIPTION: This article presents a special
- purpose software package CHI/COR that deals with
- the job of documenting the resources needed to
- implement a disaster recovery plan.
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Contingency Planning and the Law
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April 1984
- PAGE NUMBER(S): 17-18
- CATEGORY: Contingency Planning
- DESCRIPTION: This article reviews the Foreign
- Corrupt Practices Act and its requirement for record
- keeping and internal controls. Other potential legal
- liabilities are also reviewed.
-
-
- ENVIRONMENTAL SECURITY
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Computer Power and Environmental
- Controls
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 3
- ISSUE DATE: 1985 Buyer's Directory
- PAGE NUMBER(S): 13
- CATEGORY: Environmental Security
- DESCRIPTION: This article discusses common power
- anomalies and equipment available to overcome them.
-
-
- GENERAL SECURITY
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Computer Back-up Facilities
-
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April 1984
- PAGE NUMBER(S): 19-22
- CATEGORY: General Security
- DESCRIPTION: This article discusses the options of
- back-up sites including cold sites, hot sites, or
- empty shell, or fully equipped recovery sites. Also
- refers to the extent of equipment, space, and
- services provided by these back-up facilities.
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Computer Security: Issues and
- Answers
-
- NAME OF PERIODICAL: Datamation
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: September 15, 1984
- PAGE NUMBER(S): 16 Pages
- CATEGORY: General Security
-
- DESCRIPTION: This 16-page section sponsored by the
- Computer Security Institute contains several
- articles that cover a variety of computer security
- issues.
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Computer Security: Issues and
- Answers
-
- NAME OF PERIODICAL: Datamation
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: September 15 1985
- PAGE NUMBER(S): 24 Pages
- CATEGORY: General Security
-
- DESCRIPTION: This advertisement section contains
- eight articles that discuss a variety of computer
- security issues. The authors include FBI Director
- William Webster and Department of Defense Computer
- Security Center Director Robert Brotzman.
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Making The Case For Computer
- Security Pure and Simple
-
- NAME OF PERIODICAL: Datamation
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: September 1983
- PAGE NUMBER(S):
- CATEGORY: General Security
-
- DESCRIPTION: This section of Datamation is sponsored
- by the Computer Security Institute and covers a
- broad range of computer security issues in several
- different articles.
-
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Personal Computers vs. Data
- Data Security: the Two Need
- Not Be Incompatible
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 12
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: Winter 1988
- PAGE NUMBER(S): 24-26
- CATEGORY: General Security
- DESCRIPTION: This article discusses the threat of
- data loss either intentional or unintentional. It
- examines the significant risks and the data security
- policies to lower these risks.
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Protecting Information and
- Interest
-
- NAME OF PERIODICAL: Computer Management
-
- VOLUME OF PERIODICAL:
- NUMBER OF PERIODICAL:
- ISSUE DATE: October 1981
- PAGE NUMBER(S): 33-34, 36
- CATEGORY: General Security
-
- DESCRIPTION: Suppliers, consultants, and services
- related to computer security are listed in this
- directory.
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Simple Security Precautions
- Ensure Information Safety
-
- NAME OF PERIODICAL: Computerworld
-
- VOLUME OF PERIODICAL: 19
- NUMBER OF PERIODICAL: 17
- ISSUE DATE: April 1985
- PAGE NUMBER(S): SR-38
- CATEGORY: General Security
-
- DESCRIPTION: This article applies many of the
- security precautions for mainframes to the
- microcomputer.
-
-
-
- MICROCOMPUTER SECURITY
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Memo: Disaster Plan For
- Microcomputer Users
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April 1984
- PAGE NUMBER(S): 27-29
- CATEGORY: Microcomputer Security
- DESCRIPTION: This article is in the form a memo
- containing a microcomputer disaster recovery
- checklist. It address issues that should be taken in
- contingency plans.
-
-
- PHYSICAL SECURITY AND HARDWARE
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Media Safes: Countering the
- Threats of Fire
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 6
- ISSUE DATE: July/August 1985
- PAGE NUMBER(S): 18-20
- CATEGORY: Physical Security & Hardware
- DESCRIPTION: This article is a review of critical
- basic information on how to select fire resistant
- media safes.
-
-
- RISK MANAGEMENT
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Protecting The World's Largest
- Computer User
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April 1984
- PAGE NUMBER(S): 25-26
- CATEGORY: Risk Management
- DESCRIPTION: This article discusses a new high
- security off-site storage facility opening in
- Beltsville, Maryland. It also address concern with
- the lack of proper security storage today.
-
-
- SECURITY MANAGEMENT
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Computer Security Awareness:
- Organizations and Senior
- Management Concerns
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May/June 1984
- PAGE NUMBER(S): 12-13
- CATEGORY: Security Management
- DESCRIPTION: This article gives the result of a
- survey of general security and computer security
- personnel, EDP auditors, and internal auditors to
- determine the computer security awareness of their
- company and senior management.
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Records Storage and Management
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 4
- ISSUE DATE: March/April 1984
- PAGE NUMBER(S): 23-25
- CATEGORY: Security Management
- DESCRIPTION: This article addresses the questions
- which records should be stored off-site, and how
- can an off-site facility be evaluated? It also
- provides an overview of areas to consider.
-
-
-
- SOFTWARE AND OPERATING SYSTEM SECURITY
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Computer Security Software
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 1
- ISSUE DATE: September/October 1984
- PAGE NUMBER(S): 19-24
- CATEGORY: Software & Operating System Security
- DESCRIPTION: This article provides information for
- using access control software to protect the
- terminals, the data and the system itself from
- unauthorized use.
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Computer Security Software
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 9
- NUMBER OF PERIODICAL: 3
- ISSUE DATE: 1985 Buyer's Directory
- PAGE NUMBER(S): 17-18
- CATEGORY: Software and Operating System Security
- DESCRIPTION: This article addresses a wide variety
- of computer security software programs and their
- different uses.
-
-
- AUTHOR: Not Specified
-
- TITLE OF ARTICLE: Protecting Software With
- Escrow Services
-
- NAME OF PERIODICAL: Data Processing &
- Communications Security
- VOLUME OF PERIODICAL: 8
- NUMBER OF PERIODICAL: 5
- ISSUE DATE: May/June 1984
- PAGE NUMBER(S): 22-24
- CATEGORY: Software & Operating System Security
- DESCRIPTION: This article addresses some of the
- problems and answers for protecting software that
- concerns major management today.
-
-