2574 lines
143 KiB
Plaintext
2574 lines
143 KiB
Plaintext
|
|
|||
|
BIBLIOGRAPHY OF COMPUTER SECURITY ARTICLES
|
|||
|
1983 THROUGH 1988
|
|||
|
|
|||
|
(Note: A bibliograpghy is now being developed to encompass
|
|||
|
1989.)
|
|||
|
|
|||
|
AUTHORS SPECIFIED
|
|||
|
|
|||
|
ABUSE/MISUSE/CRIME
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Associated Press
|
|||
|
|
|||
|
TITLE OF ARTICLE: Jury Selection In 1st "Virus"
|
|||
|
Trial Begins
|
|||
|
|
|||
|
NAME OF PERIODICAL: Washington Post
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL: 277
|
|||
|
ISSUE DATE: September 7, 1988
|
|||
|
PAGE NUMBER(S): C1
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article is about a programmer
|
|||
|
accused of using a computer "virus" to sabotage
|
|||
|
thousands of records at his former work place.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Atkinson, L.V.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Fraud: Input Data Most
|
|||
|
Vulnerable
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld UK
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 2
|
|||
|
NUMBER OF PERIODICAL: 21
|
|||
|
ISSUE DATE: September 2, 1981
|
|||
|
PAGE NUMBER(S): 10
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: Article discusses a survey which
|
|||
|
found that the major danger to computers was the
|
|||
|
alteration of input data.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Baker, R.H.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Lining Up Computer Crooks
|
|||
|
|
|||
|
NAME OF PERIODICAL: Micro Communications
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 2
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May 1985
|
|||
|
PAGE NUMBER(S): 18-22
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article looks at crime patterns
|
|||
|
of microcomputer users breaking into mainframes.
|
|||
|
Ways in which these patterns can be learned and then
|
|||
|
stopped is discussed.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bequai, A.
|
|||
|
|
|||
|
TITLE OF ARTICLE: What to do About Crime in the
|
|||
|
Electronic Office
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 101
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: January 1985
|
|||
|
PAGE NUMBER(S): 101-104
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article discusses the important
|
|||
|
role that auditing computer systems plays in
|
|||
|
preventing crimes and abuse.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Betts, M.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Government's Computers
|
|||
|
"Highly Vulnerable" to Abuse
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 18
|
|||
|
NUMBER OF PERIODICAL: 40
|
|||
|
ISSUE DATE: October 1984
|
|||
|
PAGE NUMBER(S): 4
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: Discusses how highly vulnerable the
|
|||
|
federal government's computers are to abuse, and a
|
|||
|
congressman who is seeking to change that
|
|||
|
vulnerability.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Blakeney, S.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Crime: A Worldwide
|
|||
|
Concern
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 17, 18
|
|||
|
NUMBER OF PERIODICAL: 52, 1
|
|||
|
ISSUE DATE: December 26, 1983, January 1984
|
|||
|
PAGE NUMBER(S): 57-60
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article looks at computer crime
|
|||
|
as a worldwide problem. The most common types of
|
|||
|
computer crimes are given along with the estimated
|
|||
|
losses in various countries throughout the world.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bologna, Jack
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Related Crime: The Who,
|
|||
|
What, Where, When, Why and How
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 10
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: Winter 1986
|
|||
|
PAGE NUMBER(S): 19-23
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article looks at computer related
|
|||
|
crime from the perspectives of the individual
|
|||
|
criminal, environmental factors, organization
|
|||
|
cultures, incidence rate, and security
|
|||
|
countermeasures.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bramer, W.L.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer and Data Security is
|
|||
|
Battle Cry to the '80s
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 103
|
|||
|
NUMBER OF PERIODICAL: 3
|
|||
|
ISSUE DATE: March 1986
|
|||
|
PAGE NUMBER(S): 78-82
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article discusses the number of
|
|||
|
organizations that are looking at their security
|
|||
|
procedures and programs to deter computer abuse. The
|
|||
|
three main causes of security problems are
|
|||
|
described.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Carey, Cameron
|
|||
|
|
|||
|
TITLE OF ARTICLE: Data Access Control: Help or
|
|||
|
Hindrance
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 11
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: Fall 1987
|
|||
|
PAGE NUMBER(S): 18-20
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article discusses limiting access
|
|||
|
to data and how to make access control protection
|
|||
|
more of a help than a hindrance by developing a set
|
|||
|
of priorities about various classes of data.
|
|||
|
|
|||
|
AUTHOR: Edwards, M.
|
|||
|
|
|||
|
TITLE OF ARTICLE: The Sting in a Micro's Tail
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Practical Computing
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 6
|
|||
|
NUMBER OF PERIODICAL: 12
|
|||
|
ISSUE DATE: December 1983
|
|||
|
PAGE NUMBER(S): 108-109
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: How criminals exploit information
|
|||
|
technology is described in this article along with
|
|||
|
ways to stop them.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Elmer-Dewitt, Phillip
|
|||
|
|
|||
|
TITLE OF ARTICLE: Invasion of the Data Snatchers!
|
|||
|
|
|||
|
NAME OF PERIODICAL: Time Magazine
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 123
|
|||
|
NUMBER OF PERIODICAL: 13
|
|||
|
ISSUE DATE: September 26, 1988
|
|||
|
PAGE NUMBER(S): 62-67
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: Discusses the current threat to
|
|||
|
computer systems posed by computer viruses. Computer
|
|||
|
viruses are defined and several examples of viruses
|
|||
|
are given.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Johnson, B.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Criminal Minds Keep Pace with
|
|||
|
Technology. Stop, Thief!
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 15, 16
|
|||
|
NUMBER OF PERIODICAL: 52, 1
|
|||
|
ISSUE DATE: December 28, 1981, January 4, 1982
|
|||
|
PAGE NUMBER(S):
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article looks at some of the
|
|||
|
common problems that the DP industry faces today
|
|||
|
including computer security, asset protection, and
|
|||
|
computer fraud prevention.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Kluepfel, Henry M.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security for the
|
|||
|
Abuser Friendly Environment
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: November/December 1984
|
|||
|
PAGE NUMBER(S): 16-20
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article discusses the underlying
|
|||
|
lack of adequate controls in computer systems and
|
|||
|
their relation to computer abuse and crime.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Kull, D.
|
|||
|
|
|||
|
TITLE OF ARTICLE: How to Make Even E.F. Hutton
|
|||
|
Listen
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computer Decisions
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 17
|
|||
|
NUMBER OF PERIODICAL: 18
|
|||
|
ISSUE DATE: September 1985
|
|||
|
PAGE NUMBER(S): 42-50
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: The most effective way for an
|
|||
|
organization to prevent breaches in a computer
|
|||
|
system is to plug the holes that have already been
|
|||
|
used to violate the system and identify the
|
|||
|
intruders.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Lasden, Martin
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Crime
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computer Decisions
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: June 1981
|
|||
|
PAGE NUMBER(S): 104-106, 108 112, 116, 118, 120,
|
|||
|
122, 124
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article discusses actual computer
|
|||
|
crimes that have taken place and the factors that
|
|||
|
escalate the risk of an organization from these
|
|||
|
types of crime.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Lucas, D.
|
|||
|
|
|||
|
TITLE OF ARTICLE: The Invisible Enemy
|
|||
|
|
|||
|
NAME OF PERIODICAL: Business Computing and
|
|||
|
Communication
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: February 1985
|
|||
|
PAGE NUMBER(S): 18-20
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article describes how home
|
|||
|
computer users are breaking into some of Britain's
|
|||
|
mainframe computers. Various procedures that can
|
|||
|
protect against intrusion are also discussed by the
|
|||
|
author.
|
|||
|
|
|||
|
AUTHOR: McKibbin, W.L.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Who Gets The Blame For Computer
|
|||
|
Crime
|
|||
|
|
|||
|
NAME OF PERIODICAL: Infosystems
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 30
|
|||
|
NUMBER OF PERIODICAL: 7
|
|||
|
ISSUE DATE: July 1983
|
|||
|
PAGE NUMBER(S): 34-36
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: MIS managers are ultimately responsible
|
|||
|
for the security of their computers. Since they are
|
|||
|
responsible they should make sure upper management
|
|||
|
is aware of the vulnerabilities of their computers.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Mylott, T.R.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security and the
|
|||
|
Threats from Within
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 101
|
|||
|
NUMBER OF PERIODICAL: 3
|
|||
|
ISSUE DATE: March 1985
|
|||
|
PAGE NUMBER(S): 45-46, 190
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article explains that the greatest
|
|||
|
computer-related danger to a company may be from
|
|||
|
internal threats by employees.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: White, L.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Data Security - You Can't
|
|||
|
Work Without It
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 11A
|
|||
|
ISSUE DATE: March 1985
|
|||
|
PAGE NUMBER(S): 27-30
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: The problem of the disgruntled employee
|
|||
|
or ex-employee who sabotages a computer system is
|
|||
|
seen as more of a threat than an outside hacker.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Zalud, Bill
|
|||
|
|
|||
|
TITLE OF ARTICLE: Security and DP Cooperate to
|
|||
|
Attack Computer Crime
|
|||
|
|
|||
|
NAME OF PERIODICAL: Security
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 24
|
|||
|
NUMBER OF PERIODICAL: 10
|
|||
|
ISSUE DATE: October 1987
|
|||
|
PAGE NUMBER(S): 52-56, & 58
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article stresses teamwork as
|
|||
|
computer crime becomes a company fact of life by
|
|||
|
effectively cuts across a number of functional
|
|||
|
areas.
|
|||
|
|
|||
|
ACCESS CONTROL
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Avarne, Simon
|
|||
|
|
|||
|
TITLE OF ARTICLE: How to Find Out a Password
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 12
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: Spring 1988
|
|||
|
PAGE NUMBER(S): 16-17
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article gives examples of how to
|
|||
|
discover someones password and discusses weaknesses
|
|||
|
of traditional passwords.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Betts, M.
|
|||
|
|
|||
|
TITLE OF ARTICLE: NBS Releases Standards For
|
|||
|
Managing Password Security
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 28
|
|||
|
ISSUE DATE: July 1985
|
|||
|
PAGE NUMBER(S): 19
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: This article talks about how the
|
|||
|
National Bureau of Standards has completed a two-
|
|||
|
part publication dealing with password systems.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bowmen, Terry
|
|||
|
|
|||
|
TITLE OF ARTICLE: Undercarpet Fiber Optics
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 11
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: Spring 1987
|
|||
|
PAGE NUMBER(S): 23-26
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article discusses how fiber optics
|
|||
|
offer better security than copper cable undercarpet.
|
|||
|
It also includes how to plan an undercarpet system.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Clyde, Allen R.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Insider Threat on Automated
|
|||
|
Information Systems
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 11
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: Fall 1987
|
|||
|
PAGE NUMBER(S): 11-14
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This articles discusses activities to
|
|||
|
detect sources of abuse that are not widely
|
|||
|
implemented.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Davidson, Thomas L. and
|
|||
|
White, Clinton E. Jr.
|
|||
|
TITLE OF ARTICLE: How to Improve Network Security
|
|||
|
|
|||
|
NAME OF PERIODICAL: Infosystems
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 30
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: June 1983
|
|||
|
PAGE NUMBER(S): 110-112
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: This article discusses the need to
|
|||
|
protect network systems using software locks,
|
|||
|
authorization schemes, logs, and data encryption.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Diamond, F.H.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Network Security: The
|
|||
|
Need Was Never Greater
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 102
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: August 1985
|
|||
|
PAGE NUMBER(S): 94-99
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: This article discusses the advantages
|
|||
|
of using the callback approach in computer networks
|
|||
|
to prevent hackers from getting onto a system.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Fisher, M.J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: New Security Device "Fingers"
|
|||
|
Culprit
|
|||
|
|
|||
|
NAME OF PERIODICAL: MIS Week
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 6
|
|||
|
NUMBER OF PERIODICAL: 35
|
|||
|
ISSUE DATE: September 1985
|
|||
|
PAGE NUMBER(S): 12
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: This article describes a new product
|
|||
|
that uses a fingerprint device to verify a user's
|
|||
|
identity and then allow access on the computer
|
|||
|
system.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Horgan, J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Thwarting The Information Thiefs
|
|||
|
|
|||
|
NAME OF PERIODICAL: IEEE Spectrum
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 22
|
|||
|
NUMBER OF PERIODICAL: 7
|
|||
|
ISSUE DATE: July 1985
|
|||
|
PAGE NUMBER(S): 30-41
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: Many organizations are protecting
|
|||
|
their communication output from electronic
|
|||
|
interception by trying to detect and foil the
|
|||
|
surveillance using a variety of methods.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Jackson, Carl B.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Passwords: Comments from the
|
|||
|
Information Systems Security
|
|||
|
Association
|
|||
|
NAME OF PERIODICAL: Security
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 24
|
|||
|
NUMBER OF PERIODICAL: 7
|
|||
|
ISSUE DATE: July 1987
|
|||
|
PAGE NUMBER(S): 105
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: Discusses relevant security issues and
|
|||
|
how to bring an appropriate degree of LAN
|
|||
|
information security to your organization.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Kontur, J.S. and Letham, L.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Locking Up System Security
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Electronic Week
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 58
|
|||
|
NUMBER OF PERIODICAL: 7
|
|||
|
ISSUE DATE: February 18, 1985
|
|||
|
PAGE NUMBER(S): 68-72
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: This article describes a system that
|
|||
|
cannot be broken into by unauthorized users. It uses
|
|||
|
a random-number generator and encryption logic.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Korzeniowski, P.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Security Dynamics Releases Two-
|
|||
|
Part Security System
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 42
|
|||
|
ISSUE DATE: October 1985
|
|||
|
PAGE NUMBER(S): 19, 23
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: This article discusses a product
|
|||
|
Security Dynamics has designed that is an
|
|||
|
inexpensive security protection device which keeps
|
|||
|
hackers out of systems.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: McCarthy, Charles J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Passwords
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 10
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: Fall 1986
|
|||
|
PAGE NUMBER(S): 13-14
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article discusses the two primary
|
|||
|
password configurations passwords defined by user,
|
|||
|
and passwords assigned to a user. It shows the
|
|||
|
differences between these two from a security view.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Meason, Robert
|
|||
|
|
|||
|
TITLE OF ARTICLE: System Security at the Terminal
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 10
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: Fall 1986
|
|||
|
PAGE NUMBER(S): 16-17
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article discusses considerations
|
|||
|
of MIS management protection of the processor from
|
|||
|
access by unauthorized users.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Muzerall, Joseph V. and Carty, Thomas J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: COMSEC and Its Need for Key
|
|||
|
Management
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 11
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: Spring 1987
|
|||
|
PAGE NUMBER(S): 11-14
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article explains the establishment
|
|||
|
of a standard set of protection mechanisms for both
|
|||
|
the classified and private user communities.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Schiller, Michael
|
|||
|
|
|||
|
TITLE OF ARTICLE: Security at the Touch of a
|
|||
|
Finger
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: July/August 1985
|
|||
|
PAGE NUMBER(S): 15-17
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article discusses using biometric
|
|||
|
security systems for high-tech solutions to access
|
|||
|
control problems.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Schmonsees, Robert J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Identification and Authentication:
|
|||
|
The Security Challenge of the 80's
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April, 1985
|
|||
|
PAGE NUMBER(S): 22-23
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article discusses the computer
|
|||
|
security issues of identification and authentication
|
|||
|
showing the common problems and offering some
|
|||
|
suggestions for improving by random passcode.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Stieglitz, M.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Security For Shared Resources
|
|||
|
|
|||
|
NAME OF PERIODICAL: Micro Communications
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 2
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: June 1985
|
|||
|
PAGE NUMBER(S): 19-26
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: This article discusses data security
|
|||
|
products and procedures for network use. Includes
|
|||
|
description of encryption techniques that are now
|
|||
|
popular.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Wood, Charles Cresson
|
|||
|
|
|||
|
TITLE OF ARTICLE: A New Approach to Computer User
|
|||
|
Authentication
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 10
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: Fall 1986
|
|||
|
PAGE NUMBER(S): 21-26
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article gives a new approach to
|
|||
|
authentication called dial-guard. It addresses the
|
|||
|
two problems of password/users IDs not providing
|
|||
|
sufficient security and identifying the location of
|
|||
|
dial-up users.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Wood, Charles Cresson
|
|||
|
|
|||
|
TITLE OF ARTICLE: Information Security with
|
|||
|
One-Way Functions
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May/June 1985
|
|||
|
PAGE NUMBER(S): 14-16
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article explains how one-way
|
|||
|
functions can be used to safeguard information that
|
|||
|
is too sensitive to be protected via encryption.
|
|||
|
|
|||
|
|
|||
|
AUDIT AND EVALUATION
|
|||
|
|
|||
|
AUTHOR: Berman, A.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Evaluating On-Line Computer
|
|||
|
Security
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Communications
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 12
|
|||
|
NUMBER OF PERIODICAL: 7
|
|||
|
ISSUE DATE: July 1983
|
|||
|
PAGE NUMBER(S): 145-152
|
|||
|
CATEGORY: Audit and Evaluation
|
|||
|
|
|||
|
DESCRIPTION: The security problems that have arisen
|
|||
|
because of on-line processing are discussed in this
|
|||
|
article. Covered are the two ways to obtain a secure
|
|||
|
on-line system.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Betts, M.
|
|||
|
|
|||
|
TITLE OF ARTICLE: U.S. Agency Faces Probes, Boosts
|
|||
|
Security After Audit
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 24
|
|||
|
ISSUE DATE: June 1985
|
|||
|
PAGE NUMBER(S): 8
|
|||
|
CATEGORY: Audit and Evaluation
|
|||
|
|
|||
|
DESCRIPTION: This article discusses an audit report
|
|||
|
issued by the inspector general of the U.S.
|
|||
|
Department of the Interior in March 1985 which
|
|||
|
revealed inadequate controls over passwords, faulty
|
|||
|
operating procedures, and lack of audit trails by
|
|||
|
the Denver Service Center.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bologna, Jack
|
|||
|
|
|||
|
TITLE OF ARTICLE: Forensic Accounting
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: July/August 1984
|
|||
|
PAGE NUMBER(S): 16-20
|
|||
|
CATEGORY: Audit and Evaluation
|
|||
|
DESCRIPTION: This article identifies the skills and
|
|||
|
competency of a forensic accountant.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Flach, Joseph P.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Increasing Programming Efficiency
|
|||
|
While Preventing the "F" Word
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 11
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: Fall 1987
|
|||
|
PAGE NUMBER(S): 15-17
|
|||
|
CATEGORY: Audit and Evaluation
|
|||
|
DESCRIPTION: This article gives examples of ways
|
|||
|
to identify fraudulent code in a production program.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Gaydasch, Alexander
|
|||
|
|
|||
|
TITLE OF ARTICLE: Postimplementation Audits -
|
|||
|
A Quick, Easy Approach
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: February 1983
|
|||
|
PAGE NUMBER(S): 54, 55, 69
|
|||
|
CATEGORY: Audit and Evaluation
|
|||
|
|
|||
|
DESCRIPTION: This article describes post-
|
|||
|
implementation audits and how they help to determine
|
|||
|
whether a computer system has met its original
|
|||
|
criteria.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CONTINGENCY PLANNING
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Cabell, D.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Network Backups
|
|||
|
|
|||
|
NAME OF PERIODICAL: Micro Communications
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 2
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: June 1985
|
|||
|
PAGE NUMBER(S): 14-18
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
|
|||
|
DESCRIPTION: This article describes how the only way
|
|||
|
to protect a LAN, micro, mini, or mainframe from a
|
|||
|
complete system crash is adequate backup.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Ciura, J.M.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Vital Records Protection:
|
|||
|
Identifying Essential
|
|||
|
Information
|
|||
|
NAME OF PERIODICAL: Information Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: February 1985
|
|||
|
PAGE NUMBER(S): 11
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
|
|||
|
DESCRIPTION: This article suggest that the best way
|
|||
|
to resume business activity after an emergency or
|
|||
|
disaster is to have a vital records protection
|
|||
|
program.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Clauss, Karl H.
|
|||
|
|
|||
|
TITLE OF ARTICLE: How To Move A Data Center and
|
|||
|
Avoid a Disaster
|
|||
|
|
|||
|
NAME OF PERIODICAL: Infosystems
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: December 1981
|
|||
|
PAGE NUMBER(S): 46-48, 50
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
|
|||
|
DESCRIPTION: This article describes how ARCO Oil
|
|||
|
and Gas Company moved their computer center to a new
|
|||
|
location and the points a company should consider
|
|||
|
when moving a data center.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Dobberstein, M.
|
|||
|
|
|||
|
TITLE OF ARTICLE: To Have and Not to Have a
|
|||
|
Disaster
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computer Decisions
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 17
|
|||
|
NUMBER OF PERIODICAL: 18
|
|||
|
ISSUE DATE: September 1985
|
|||
|
PAGE NUMBER(S): 102-126
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
|
|||
|
DESCRIPTION: This article deals with the importance
|
|||
|
of actually testing contingency plans to see if they
|
|||
|
work.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Minoli, D.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Backup Needs Merit Special
|
|||
|
Attention
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 15
|
|||
|
ISSUE DATE: April 1985
|
|||
|
PAGE NUMBER(S): 91, 96
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
|
|||
|
DESCRIPTION: This article focuses on the merits of
|
|||
|
backing up a data center to prevent a major disaster
|
|||
|
from critically affecting a company.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Pujals, J.M.
|
|||
|
|
|||
|
TITLE OF ARTICLE: What is a Contingency Plan?
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 12
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: Winter 1988
|
|||
|
PAGE NUMBER(S): 19-23
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
DESCRIPTION: This article tells how to construct a
|
|||
|
contingency plan and goes over the major mandatory
|
|||
|
steps that have to be taken to end up with a
|
|||
|
workable product.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Raimondi, D.
|
|||
|
|
|||
|
TITLE OF ARTICLE: E.F. Hutton Underscores
|
|||
|
Practicality in Backup Plan
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 15
|
|||
|
ISSUE DATE: April 1985
|
|||
|
PAGE NUMBER(S): 19
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
|
|||
|
DESCRIPTION: Describes how E.F. Hutton has built a
|
|||
|
new computer room as part of its disaster recovery
|
|||
|
plan.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Rames, David
|
|||
|
|
|||
|
TITLE OF ARTICLE: Recovering From Disasters
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computer Decisions
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: September 1981
|
|||
|
PAGE NUMBER(S): 108-110, 112, 114, 120, 122, 124,
|
|||
|
126-131, 188-189
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
|
|||
|
DESCRIPTION: Described in this article are criteria
|
|||
|
for developing an emergency backup plan and examples
|
|||
|
of emergency backup alternatives.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Scoma, Louis
|
|||
|
|
|||
|
TITLE OF ARTICLE: How Secure Is Your Computer
|
|||
|
Operation From A Disaster
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: August 1981
|
|||
|
PAGE NUMBER(S): 96, 98
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
|
|||
|
DESCRIPTION: The failures of companies to protect
|
|||
|
their computer centers is discussed along with the
|
|||
|
need for recovery systems to serve as backup
|
|||
|
security.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Wolbrecht, J.E.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Can Your Records Storage Center
|
|||
|
Stand a Disaster
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 102
|
|||
|
NUMBER OF PERIODICAL: 3
|
|||
|
ISSUE DATE: September 1985
|
|||
|
PAGE NUMBER(S): 112-113
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
|
|||
|
DESCRIPTION: A manager's responsibility to protect
|
|||
|
a records storage center by recognizing vulnerable
|
|||
|
areas and making them more secure is discussed.
|
|||
|
|
|||
|
|
|||
|
DATABASE MANAGEMENT
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Pieper, Oscar R.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Voice Authentication Wages A War
|
|||
|
on Data Base Fraud
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: July/August 1984
|
|||
|
PAGE NUMBER(S): 12-13
|
|||
|
CATEGORY: Data Base Security
|
|||
|
DESCRIPTION: This article reviews the present state
|
|||
|
of voice authentication technology and how it
|
|||
|
applies to secure data bases from bogus intruders.
|
|||
|
|
|||
|
|
|||
|
ENVIRONMENTAL SECURITY
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Lemke, Fred H.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Blackouts and Computer Power
|
|||
|
Protection
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 12
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: Spring 1988
|
|||
|
PAGE NUMBER(S): 19-23
|
|||
|
CATEGORY: Environmental Security
|
|||
|
DESCRIPTION: This article is a study that was taken
|
|||
|
to see emerging patterns of blackouts that may be
|
|||
|
useful in helping evaluate your level of blackout
|
|||
|
vulnerability and then set up appropriate levels of
|
|||
|
power protection for your electronic systems.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Lemke, Fred H.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Power Protection
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April 1984
|
|||
|
PAGE NUMBER(S): 31-33
|
|||
|
CATEGORY: Environmental Security
|
|||
|
DESCRIPTION: This article gives examples of how to
|
|||
|
protect your facility against the harmful effects of
|
|||
|
an electrical power outage.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: McGowan, Kevin J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Power Protection
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May/June 1985
|
|||
|
PAGE NUMBER(S): 21-25
|
|||
|
CATEGORY: Environmental Security
|
|||
|
DESCRIPTION: This article looks at understanding
|
|||
|
AC power conditions in data processing site
|
|||
|
preparation and its criticality for preventing
|
|||
|
future computer downtime and disruptions.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
GENERAL SECURITY
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Beitman, L.
|
|||
|
|
|||
|
TITLE OF ARTICLE: A Practical Guide To Small
|
|||
|
Business Computer Security
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 96
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: August 1982
|
|||
|
PAGE NUMBER(S): 86, 90
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: This article gives advice on how to
|
|||
|
obtain computer security in a small business
|
|||
|
environment. A checklist is included that will help
|
|||
|
to prevent accidental and intentional harm to a
|
|||
|
system.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Collins, J.A.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Continuous Security Control
|
|||
|
Clamps Down on Abuse
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 23
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May 1985
|
|||
|
PAGE NUMBER(S): 56-59
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: The need for computer access is
|
|||
|
discussed in this article that suggest that such
|
|||
|
access should be a management, security-oriented
|
|||
|
process. Computer security guidelines are also
|
|||
|
given.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Coontz, Constance
|
|||
|
|
|||
|
TITLE OF ARTICLE: Protection through Isolation
|
|||
|
|
|||
|
NAME OF PERIODICAL: Security Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 31
|
|||
|
NUMBER OF PERIODICAL: 11
|
|||
|
ISSUE DATE: November 1987
|
|||
|
PAGE NUMBER(S): 53-55
|
|||
|
CATEGORY: General Security
|
|||
|
DESCRIPTION: This article discusses
|
|||
|
compartmentalizing valuable data on dedicated PCs or
|
|||
|
small computer systems to help protect it from
|
|||
|
hackers and moles.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Gazarek, Kenneth F.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Cabinets for Electromagnetic
|
|||
|
Interference/Radio-Frequency Interference and
|
|||
|
TEMPEST Shielding
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: July/August 1985
|
|||
|
PAGE NUMBER(S): 12-13
|
|||
|
CATEGORY: General Security
|
|||
|
DESCRIPTION: This article discusses the
|
|||
|
electromagnetic interference and radio-frequency
|
|||
|
interference control options, designing and building
|
|||
|
metal cabinets that provide effective shielding.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Lobel, J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Third Decade of Concern
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 16
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: February 8, 1982
|
|||
|
PAGE NUMBER(S): 1D/31-34 & 36
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: The author looks at some of the issues
|
|||
|
associated with distributed data processing
|
|||
|
including privacy, crime, and security.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Miskiewicz, J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: DP Security: A Delicate Balance
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computer Decisions
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 17
|
|||
|
NUMBER OF PERIODICAL: 8
|
|||
|
ISSUE DATE: April 1985
|
|||
|
PAGE NUMBER(S): 104-106
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: This article discusses the delicate
|
|||
|
balance between protecting vital resources in a data
|
|||
|
processing facility and enhancing productivity.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Moulton, R.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Prevention: Better Than
|
|||
|
Prosecution
|
|||
|
|
|||
|
NAME OF PERIODICAL: Government Data Systems
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 10
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: November/December 1981
|
|||
|
PAGE NUMBER(S): 20 & 22-23
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: The focus of this paper is on
|
|||
|
deterrence of computer abuse, whether it is
|
|||
|
unintentional or intentional.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Parker, D.B.
|
|||
|
|
|||
|
TITLE OF ARTICLE: The Many Faces of Data
|
|||
|
Vulnerability
|
|||
|
|
|||
|
NAME OF PERIODICAL: IEEE Spectrum
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 21
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May 1984
|
|||
|
PAGE NUMBER(S): 46-49
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: Discussed in this paper are both the
|
|||
|
need for new computer security methods and the
|
|||
|
attainable limits that can be reached by computer
|
|||
|
security.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Rosch, W.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Three Products Help Cork Computer
|
|||
|
Leaks, Feature Blocked Access,
|
|||
|
Disk-File Encryption
|
|||
|
NAME OF PERIODICAL: PC Week
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 2
|
|||
|
NUMBER OF PERIODICAL: 18
|
|||
|
ISSUE DATE: May 1985
|
|||
|
PAGE NUMBER(S): 122-124
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: This article discusses a trio of
|
|||
|
products to help prevent unauthorized access to a
|
|||
|
computer system.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Rosen, Richard D. and Dvorsky, James
|
|||
|
|
|||
|
TITLE OF ARTICLE: Portable Data Carrier Technology
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 12
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: Winter 1988
|
|||
|
PAGE NUMBER(S): 9-19
|
|||
|
CATEGORY: General Security
|
|||
|
DESCRIPTION: This article presents an overview of
|
|||
|
the general field of portable data carrier
|
|||
|
technology. Included are not only smart cards but
|
|||
|
other devices and systems that are beginning to
|
|||
|
emerge in the marketplace.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Srinivasan, C.A. and Dascher, P.E.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security and Integrity:
|
|||
|
Problems and Prospects
|
|||
|
|
|||
|
NAME OF PERIODICAL: Infosystems
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 28
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May 1981
|
|||
|
PAGE NUMBER(S): 5 Pages
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: Various aspects of computer security
|
|||
|
are discussed including data security, data privacy,
|
|||
|
data integrity, etc.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Weller, Reginald H.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Off-Site Data Storage: A Changing
|
|||
|
Industry
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May/June 1985
|
|||
|
PAGE NUMBER(S): 18-20
|
|||
|
CATEGORY: General Security
|
|||
|
DESCRIPTION: This article discusses selecting a
|
|||
|
backup site while meeting the criteria of integrity,
|
|||
|
reliability, access, reasonable cost, appropriate
|
|||
|
location, good security, and comprehensive insurance
|
|||
|
coverage.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Wright, J.R. Jr.
|
|||
|
|
|||
|
TITLE OF ARTICLE: User Responsibility for Security
|
|||
|
|
|||
|
NAME OF PERIODICAL: Government Data Systems
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 15
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: December 1985 through January 1986
|
|||
|
PAGE NUMBER(S): 52-55
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: This article looks at the circular
|
|||
|
"Management of Federal Information Resources"
|
|||
|
printed by the Office of Management and Budget.
|
|||
|
This circular provides guidance to Federal Managers
|
|||
|
concerning computer security and the associated
|
|||
|
responsibilities.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Zimmerman, J.S.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Is Your Computer Insecure?
|
|||
|
|
|||
|
NAME OF PERIODICAL: Datamation
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 31
|
|||
|
NUMBER OF PERIODICAL: 10
|
|||
|
ISSUE DATE: May 1985
|
|||
|
PAGE NUMBER(S): 119-120
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: This article challenges widely
|
|||
|
accepted notions concerning computer security. It
|
|||
|
suggest that people's views should be changed so
|
|||
|
that the challenge will be making a security system
|
|||
|
work instead of beating it.
|
|||
|
|
|||
|
LAW AND ETHICS
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bequai, August
|
|||
|
|
|||
|
TITLE OF ARTICLE: Federal Computer Crime
|
|||
|
Legislation is Needed
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: May 1981
|
|||
|
PAGE NUMBER(S): 22-24
|
|||
|
CATEGORY: Law & Ethics
|
|||
|
|
|||
|
DESCRIPTION: The ways criminals use loopholes in
|
|||
|
our present criminal justice system is discussed
|
|||
|
along with a history of computer crime legislation.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Betts, M.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Reagan Systems Security
|
|||
|
Directive Under Attack
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 27
|
|||
|
ISSUE DATE: July 1985
|
|||
|
PAGE NUMBER(S): 1
|
|||
|
CATEGORY: Law & Ethics
|
|||
|
|
|||
|
DESCRIPTION: This article discusses why members of
|
|||
|
congress are concerned over how the National
|
|||
|
Security Decision Directive 145 on computer security
|
|||
|
could be abused by military and intelligence
|
|||
|
officials.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bigelow, R.P.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security And Law
|
|||
|
|
|||
|
NAME OF PERIODICAL: Infosystems
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 29
|
|||
|
NUMBER OF PERIODICAL: 12
|
|||
|
ISSUE DATE: December 1982
|
|||
|
PAGE NUMBER(S): 84
|
|||
|
CATEGORY: Law & Ethics
|
|||
|
|
|||
|
DESCRIPTION: This article looks at how a memo from
|
|||
|
the legal department should be structured concerning
|
|||
|
the protection of assets.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Hagopian, Greg
|
|||
|
|
|||
|
TITLE OF ARTICLE: Planning and Implementing a
|
|||
|
Security Package
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 10
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: Fall 1986
|
|||
|
PAGE NUMBER(S): 17-20
|
|||
|
CATEGORY: Law & Ethics
|
|||
|
DESCRIPTION: This article discusses vendor selection
|
|||
|
and legal issues.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Roberts, J.E.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Filing Software Copyrights
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 36
|
|||
|
ISSUE DATE: September 1985
|
|||
|
PAGE NUMBER(S): 116
|
|||
|
CATEGORY: Law & Ethics
|
|||
|
|
|||
|
DESCRIPTION: This article describes how copyrighting
|
|||
|
software is accomplished and what copyrighted
|
|||
|
software means.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MICROCOMPUTER SECURITY
|
|||
|
|
|||
|
AUTHOR: Koelle, Jim
|
|||
|
|
|||
|
TITLE OF ARTICLE: What's in the Cards?
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Security
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 23
|
|||
|
NUMBER OF PERIODICAL: 12
|
|||
|
ISSUE DATE: December 1986
|
|||
|
PAGE NUMBER(S): 42-44, and 46
|
|||
|
CATEGORY: Microcomputer Security
|
|||
|
DESCRIPTION: This article discusses microchips and
|
|||
|
how they promise to revolutionize access card
|
|||
|
technology with fast, calculating, and advanced
|
|||
|
memories.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Rhodes, B.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Micro Security That Makes Sense
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computer Decisions
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 17
|
|||
|
NUMBER OF PERIODICAL: 9
|
|||
|
ISSUE DATE: May 1985
|
|||
|
PAGE NUMBER(S): 72, 74-76
|
|||
|
CATEGORY: Microcomputer Security
|
|||
|
|
|||
|
DESCRIPTION: This article describes security
|
|||
|
procedures that can be used by employees to solve
|
|||
|
microcomputer security problems.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Zimmerman, J.S.
|
|||
|
|
|||
|
TITLE OF ARTICLE: P.C. Security: So What's New
|
|||
|
|
|||
|
NAME OF PERIODICAL: Datamation
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 31
|
|||
|
NUMBER OF PERIODICAL: 21
|
|||
|
ISSUE DATE: November 1985
|
|||
|
PAGE NUMBER(S): 89-92
|
|||
|
CATEGORY: Microcomputer Security
|
|||
|
|
|||
|
DESCRIPTION: This article looks at the problems
|
|||
|
data security officers are going to encounter even
|
|||
|
as they implement safeguards for micros.
|
|||
|
|
|||
|
|
|||
|
PHYSICAL SECURITY AND HARDWARE
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Call, B.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Buttress Against Computer
|
|||
|
Crime
|
|||
|
|
|||
|
NAME OF PERIODICAL: PC Week
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 2
|
|||
|
NUMBER OF PERIODICAL: 18
|
|||
|
ISSUE DATE: May 1985
|
|||
|
PAGE NUMBER(S): 111, 115
|
|||
|
CATEGORY: Physical Security & Hardware
|
|||
|
|
|||
|
DESCRIPTION: The physical protection of computers is
|
|||
|
becoming an area of interest for more organizations.
|
|||
|
The increased number of physical security devices
|
|||
|
illustrates this point and is discussed in this
|
|||
|
article.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Epner, S.A.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security: Plenty of
|
|||
|
Questions but No Easy Answers
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 101
|
|||
|
NUMBER OF PERIODICAL: 3
|
|||
|
ISSUE DATE: March 1985
|
|||
|
PAGE NUMBER(S): 74-76
|
|||
|
CATEGORY: Physical Security & Hardware
|
|||
|
|
|||
|
DESCRIPTION: This article covers the physical
|
|||
|
security of computer equipment including air
|
|||
|
conditioning and power to pass cards and security
|
|||
|
guards.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PRIVACY
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Jordan, Halmuth
|
|||
|
|
|||
|
TITLE OF ARTICLE: The Search for Privacy
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Security Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 31
|
|||
|
NUMBER OF PERIODICAL: 11
|
|||
|
ISSUE DATE: November 1987
|
|||
|
PAGE NUMBER(S): 32-36
|
|||
|
CATEGORY: Privacy
|
|||
|
DESCRIPTION: This article focuses on some of the
|
|||
|
difficulties the legal profession is having by
|
|||
|
looking at American and West German law regarding
|
|||
|
electronic surveillance.
|
|||
|
|
|||
|
RISK MANAGEMENT
|
|||
|
|
|||
|
AUTHOR: Armstrong, James R.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Protecting the Corporate Data
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April, 1985
|
|||
|
PAGE NUMBER(S): 16-17
|
|||
|
CATEGORY: Risk Management
|
|||
|
DESCRIPTION: This article discusses how most
|
|||
|
alternative off-site lack the environmental control,
|
|||
|
security and accessibility needed. Includes a
|
|||
|
discussion on things to consider in selecting an
|
|||
|
off-site storage facility.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bologna, Jack
|
|||
|
|
|||
|
TITLE OF ARTICLE: Disaster/Recovery Planning: A
|
|||
|
Qualitative Approach
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April 1984
|
|||
|
PAGE NUMBER(S): 11-15
|
|||
|
CATEGORY: Risk Management
|
|||
|
DESCRIPTION: Developing a disaster/recovery plan
|
|||
|
usually involves a detailed quantitative risk
|
|||
|
analysis; the author offers a more qualitative
|
|||
|
approach that is less time consuming and will obtain
|
|||
|
a higher level of commitment from management, D/P
|
|||
|
staff, and users.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bologna, Jack
|
|||
|
|
|||
|
TITLE OF ARTICLE: Industrial Security In a
|
|||
|
Nutshell: A Risk by any Other
|
|||
|
Name
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May/June 1985
|
|||
|
PAGE NUMBER(S): 12-13
|
|||
|
CATEGORY: Risk Management
|
|||
|
DESCRIPTION: This article discusses properly
|
|||
|
understanding risk and how the opposite side of risk
|
|||
|
is opportunity for growth and development.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bologna, Jack
|
|||
|
|
|||
|
TITLE OF ARTICLE: Risk Assessment Guidelines for
|
|||
|
Fidelity Insurance
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April, 1985
|
|||
|
PAGE NUMBER(S): 18-20
|
|||
|
CATEGORY: Risk Management
|
|||
|
DESCRIPTION: This article is a review of the
|
|||
|
adequacy of asset protection plans, policies,
|
|||
|
procedures and controls to enlighten top management.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Helsing, Cherly W.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Disaster Recovery Options
|
|||
|
|
|||
|
NAME OF PERIODICAL: Security
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 24
|
|||
|
NUMBER OF PERIODICAL: 7
|
|||
|
ISSUE DATE: July 1987
|
|||
|
PAGE NUMBER(S): 100-103
|
|||
|
CATEGORY: Risk Management
|
|||
|
DESCRIPTION: This article has suggestions on how to
|
|||
|
find a recovery plan that fits your firm without
|
|||
|
damaging your profits.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Linden, Jack
|
|||
|
|
|||
|
TITLE OF ARTICLE: Automated EDP Risk Analysis
|
|||
|
and Management
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: September/October 1984
|
|||
|
PAGE NUMBER(S): 16-18
|
|||
|
CATEGORY: Risk Management
|
|||
|
DESCRIPTION: This article gives a cost effective
|
|||
|
first step in developing a successful computer
|
|||
|
security program using a cost benefit analysis
|
|||
|
approach.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Schweig, Barry B.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Decision Matrix: A Risk Handling
|
|||
|
Decision Aid
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April 1984
|
|||
|
PAGE NUMBER(S): 16-18
|
|||
|
CATEGORY: Risk Management
|
|||
|
DESCRIPTION: This article discusses conceptualizing
|
|||
|
a decision-matrix as an integral component of a risk
|
|||
|
management process.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Vernick, Paul R.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Providing Data Processing
|
|||
|
Recovery Backup
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April, 1985
|
|||
|
PAGE NUMBER(S): 14-16
|
|||
|
CATEGORY: Risk Management
|
|||
|
DESCRIPTION: This article covers some of the major
|
|||
|
emergency and recovery planning options available
|
|||
|
that need to be considered prior to the occurrence
|
|||
|
of any serious emergency.
|
|||
|
|
|||
|
|
|||
|
SECURITY MANAGEMENT
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bologna, Jack
|
|||
|
|
|||
|
TITLE OF ARTICLE: Security Planning: The "Tapps"
|
|||
|
Method
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 10
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: Fall 1986
|
|||
|
PAGE NUMBER(S): 7-11
|
|||
|
CATEGORY: Security Management
|
|||
|
DESCRIPTION: This article covers a system approach
|
|||
|
to assets protection. It discusses an analytical
|
|||
|
process called Total Assets Protection Planning
|
|||
|
System (TAPPS) which consist of organization,
|
|||
|
structure and mandate of the security function.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bologna, Jack
|
|||
|
|
|||
|
TITLE OF ARTICLE: Selling Computer Security to
|
|||
|
Top Management
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May/June 1984
|
|||
|
PAGE NUMBER(S): 13-16
|
|||
|
CATEGORY: Security Management
|
|||
|
DESCRIPTION: This article discusses positive
|
|||
|
motivational impact, minimizing risk, and cost
|
|||
|
feasibility in selling computer security to top
|
|||
|
managers.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bologna, Jack
|
|||
|
|
|||
|
TITLE OF ARTICLE: Why the Corporate Security
|
|||
|
Function is Being Downsized
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 11
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: Spring 1987
|
|||
|
PAGE NUMBER(S): 20-21
|
|||
|
CATEGORY: Security Management
|
|||
|
DESCRIPTION: This article discusses the disbanding
|
|||
|
and dilution of corporate security functions and
|
|||
|
how this effects the security of a firm.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Goldstein, Bruce
|
|||
|
|
|||
|
TITLE OF ARTICLE: Information Security: The
|
|||
|
Information Resource Management
|
|||
|
Approach
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May/June 1984
|
|||
|
PAGE NUMBER(S): 18-22
|
|||
|
CATEGORY: Security Management
|
|||
|
DESCRIPTION: This article addresses information as
|
|||
|
a asset that must be protected as any other asset.
|
|||
|
It also discusses information research management
|
|||
|
providing the framework for a comprehensive
|
|||
|
information security program.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Harris, N.L.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Rigid Administrative Procedures
|
|||
|
Prevent Computer Security
|
|||
|
Failure
|
|||
|
NAME OF PERIODICAL: Data Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 22
|
|||
|
NUMBER OF PERIODICAL: 12
|
|||
|
ISSUE DATE: December 1984
|
|||
|
PAGE NUMBER(S): 13-14, 16
|
|||
|
CATEGORY: Security Management
|
|||
|
|
|||
|
DESCRIPTION: The best way to keep a security program
|
|||
|
from failing is the use of strict administrative
|
|||
|
procedures. This article also discusses why some
|
|||
|
systems fail.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Reber, Jan
|
|||
|
|
|||
|
TITLE OF ARTICLE: The Essence of Industrial
|
|||
|
Espionage
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 10
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: Winter 1986
|
|||
|
PAGE NUMBER(S): 24-25
|
|||
|
CATEGORY: Security Management
|
|||
|
DESCRIPTION: This article discusses understanding
|
|||
|
espionage by a characteristic all spies have in
|
|||
|
common "access to the target".
|
|||
|
|
|||
|
SOFTWARE AND OPERATING SYSTEM SECURITY
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Adler, Stacy
|
|||
|
|
|||
|
TITLE OF ARTICLE: 7 Myths of Computer Security
|
|||
|
|
|||
|
NAME OF PERIODICAL: Security
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 24
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: January 1987
|
|||
|
PAGE NUMBER(S): 50-52
|
|||
|
CATEGORY: Software & Operating System Security
|
|||
|
DESCRIPTION: This article covers consultants that
|
|||
|
clear misconceptions about data protection software.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Edwards, J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Ends in Sight for the
|
|||
|
Copy-Protection Debate
|
|||
|
|
|||
|
NAME OF PERIODICAL: PC Week
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 3
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: January 1986
|
|||
|
PAGE NUMBER(S): 101 & 105
|
|||
|
CATEGORY: Software & Operating System Security
|
|||
|
|
|||
|
DESCRIPTION: This protection of software from
|
|||
|
unauthorized use may be coming to an end as
|
|||
|
Microsoft Corporation has decided to lift the
|
|||
|
protection from several of its software programs.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Koreniowski, P.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Adapso Making Progress on
|
|||
|
Software Protection Device
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 24
|
|||
|
ISSUE DATE: June 1985
|
|||
|
PAGE NUMBER(S): 8
|
|||
|
CATEGORY: Software & Operating System Security
|
|||
|
|
|||
|
DESCRIPTION: This article discusses how the
|
|||
|
Association of Data Processing Service Organizations
|
|||
|
(ADAPSO) is getting ready to announce its progress
|
|||
|
in creating a software authorization mechanism.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Schriever, Joe F.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Structuring for Security
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: September/October 1984
|
|||
|
PAGE NUMBER(S): 14-16
|
|||
|
CATEGORY: Software & Operating System Security
|
|||
|
DESCRIPTION: This article is a set of guidelines
|
|||
|
that will remove ambiguities as to what will be
|
|||
|
done by whom to provide system security.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TRAINING AND AWARENESS
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bezdek, J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Across-the-Board Training
|
|||
|
Protects Data
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 18
|
|||
|
NUMBER OF PERIODICAL: 44
|
|||
|
ISSUE DATE: October 1984
|
|||
|
PAGE NUMBER(S): SR-10
|
|||
|
CATEGORY: Training & Awareness
|
|||
|
|
|||
|
DESCRIPTION: This special report covers the four
|
|||
|
areas that a training program in computer security
|
|||
|
needs to include. These are plant physical security,
|
|||
|
logical security, administrative security, and the
|
|||
|
legal and social aspects of security training.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Bound, W.A.J.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Security Protecting Information
|
|||
|
Resources and Media
|
|||
|
|
|||
|
NAME OF PERIODICAL: Information Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 18
|
|||
|
NUMBER OF PERIODICAL: 8
|
|||
|
ISSUE DATE: August 1984
|
|||
|
PAGE NUMBER(S): 18-19
|
|||
|
CATEGORY: Training & Awareness
|
|||
|
|
|||
|
DESCRIPTION: This article discusses what a manager
|
|||
|
must consider when designing an office security
|
|||
|
program to protect against the four vulnerabilities
|
|||
|
of a system: personnel, physical, administrative,
|
|||
|
and technical.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Johnston, R.E.
|
|||
|
|
|||
|
TITLE OF ARTICLE: What You Need To Know
|
|||
|
|
|||
|
NAME OF PERIODICAL: Infosystems
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 32
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: January 1985
|
|||
|
PAGE NUMBER(S): 56
|
|||
|
CATEGORY: Training & Awareness
|
|||
|
|
|||
|
DESCRIPTION: Outlined in this article are those
|
|||
|
things that should be considered when establishing
|
|||
|
a computer security program or updating an existing
|
|||
|
program.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Leuser, K.G.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Security Programs: Only as
|
|||
|
Good as We Make Them
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 100
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: August 1984
|
|||
|
PAGE NUMBER(S): 91-92
|
|||
|
CATEGORY: Training & Awareness
|
|||
|
|
|||
|
DESCRIPTION: Discusses how an effective security
|
|||
|
program helps to foil or discourage people with
|
|||
|
dishonest intentions. Looks at the office
|
|||
|
administrator's domain to identify areas of
|
|||
|
potential vulnerability.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Weber, A.
|
|||
|
|
|||
|
TITLE OF ARTICLE: Effective Security Programs
|
|||
|
Start with Awareness
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 23
|
|||
|
NUMBER OF PERIODICAL: 11
|
|||
|
ISSUE DATE: November 1985
|
|||
|
PAGE NUMBER(S): 34-35
|
|||
|
CATEGORY: Training & Awareness
|
|||
|
|
|||
|
DESCRIPTION: Educating end users is the key to
|
|||
|
helping prevent crime and computer abuse in an
|
|||
|
organization.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHORS NOT SPECIFIED
|
|||
|
|
|||
|
ABUSE/MISUSE/CRIME
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer "Hacking" is No Longer
|
|||
|
Just a Lark
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 102
|
|||
|
NUMBER OF PERIODICAL: 3
|
|||
|
ISSUE DATE: September 1985
|
|||
|
PAGE NUMBER(S): 90-95
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
|
|||
|
DESCRIPTION: Computer hackers will use computers to
|
|||
|
obtain information and resell it, use it for
|
|||
|
blackmail, extortion, and espionage. This article
|
|||
|
discusses techniques for preventing hackers from
|
|||
|
getting on a system, and monitoring them if they are
|
|||
|
discovered.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security: The Menace
|
|||
|
is Human Error
|
|||
|
|
|||
|
NAME OF PERIODICAL: Office
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 99
|
|||
|
NUMBER OF PERIODICAL: 3
|
|||
|
ISSUE DATE: March 1984
|
|||
|
PAGE NUMBER(S): 119-120
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
|
|||
|
DESCRIPTION: This article stresses that managers
|
|||
|
should understand that data security is a people
|
|||
|
problem and not a computer problem. People are the
|
|||
|
ones that either accidentally or intentionally
|
|||
|
misuse a computer system.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Internal Security
|
|||
|
|
|||
|
NAME OF PERIODICAL: PC Week
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 2
|
|||
|
NUMBER OF PERIODICAL: 18
|
|||
|
ISSUE DATE: May 1985
|
|||
|
PAGE NUMBER(S): 89-91, 106-107
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
|
|||
|
DESCRIPTION: Experts feel that local computer access
|
|||
|
is more prone to intrusion than long-distance
|
|||
|
access. This article discusses how insiders in a
|
|||
|
company are the ones most likely to abuse a computer
|
|||
|
system.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Reporting Computer Crime
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: July/August 1984
|
|||
|
PAGE NUMBER(S): 20-21
|
|||
|
CATEGORY: Abuse/Misuse/Crime
|
|||
|
DESCRIPTION: This article presents a suggested
|
|||
|
format for a final report to use in documenting
|
|||
|
actions surrounding a computer crime.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ACCESS CONTROL
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Communications and Systems
|
|||
|
Security
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 3
|
|||
|
ISSUE DATE: 1985 Buyer's Directory
|
|||
|
PAGE NUMBER(S): 11-13
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article discusses a wide variety
|
|||
|
of communications and system security protection
|
|||
|
methods. Includes encryption, fiber optics, key
|
|||
|
management, optical links, electrical emanations,
|
|||
|
and dial-up access protection devices.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Communications
|
|||
|
Security Lexicon
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 11
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: Spring 1987
|
|||
|
PAGE NUMBER(S): 22-23
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article is an update containing
|
|||
|
some new added security definitions of terms and
|
|||
|
phrases.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Controlling Access To Your Data
|
|||
|
|
|||
|
NAME OF PERIODICAL: Personal Computing
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 9
|
|||
|
ISSUE DATE: September 1985
|
|||
|
PAGE NUMBER(S): 60-72
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: Explains measures that can be taken
|
|||
|
to protect what's in a computer. Focuses not only
|
|||
|
on vandals, but also on people who accidentally harm
|
|||
|
the computer.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Dial-Up Access Security Products
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 2
|
|||
|
ISSUE DATE: November/December 1984
|
|||
|
PAGE NUMBER(S): 21-24
|
|||
|
CATEGORY: Access Control
|
|||
|
DESCRIPTION: This article presents some new dial-up
|
|||
|
access security products and their major features.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Enhancements Out For Barrier
|
|||
|
Security Devices
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 18
|
|||
|
NUMBER OF PERIODICAL: 35
|
|||
|
ISSUE DATE: August 1984
|
|||
|
PAGE NUMBER(S): 51
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: This article discusses the password
|
|||
|
protection device designed by International Anasazi,
|
|||
|
Inc. that will limit access on dial-up lines.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Firesign Unwraps Security
|
|||
|
Feature
|
|||
|
|
|||
|
NAME OF PERIODICAL: MIS Week
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 5
|
|||
|
NUMBER OF PERIODICAL: 23
|
|||
|
ISSUE DATE: June 1984
|
|||
|
PAGE NUMBER(S): 24
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: This article discusses Firesign
|
|||
|
Computer Company's product that provides for network
|
|||
|
security by its password system.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Security Computer Outsmarts
|
|||
|
Colorado Bandits
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 7
|
|||
|
ISSUE DATE: July 1981
|
|||
|
PAGE NUMBER(S): 17-18
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: This article looks at the effectiveness
|
|||
|
of a security system that controls access to several
|
|||
|
high-rise buildings in Colorado.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Security Lock Ready for PCs
|
|||
|
|
|||
|
NAME OF PERIODICAL: MIS Week
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 6
|
|||
|
NUMBER OF PERIODICAL: 26
|
|||
|
ISSUE DATE: July 1985
|
|||
|
PAGE NUMBER(S): 30
|
|||
|
CATEGORY: Access Control
|
|||
|
|
|||
|
DESCRIPTION: The hard disk security product "Knight
|
|||
|
Data Security Manager" is discussed. This product
|
|||
|
allows password protection in a PC.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
CONTINGENCY PLANNING
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Automated Contingency Planning
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April 1984
|
|||
|
PAGE NUMBER(S): 22
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
DESCRIPTION: This article presents a special
|
|||
|
purpose software package CHI/COR that deals with
|
|||
|
the job of documenting the resources needed to
|
|||
|
implement a disaster recovery plan.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Contingency Planning and the Law
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April 1984
|
|||
|
PAGE NUMBER(S): 17-18
|
|||
|
CATEGORY: Contingency Planning
|
|||
|
DESCRIPTION: This article reviews the Foreign
|
|||
|
Corrupt Practices Act and its requirement for record
|
|||
|
keeping and internal controls. Other potential legal
|
|||
|
liabilities are also reviewed.
|
|||
|
|
|||
|
|
|||
|
ENVIRONMENTAL SECURITY
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Power and Environmental
|
|||
|
Controls
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 3
|
|||
|
ISSUE DATE: 1985 Buyer's Directory
|
|||
|
PAGE NUMBER(S): 13
|
|||
|
CATEGORY: Environmental Security
|
|||
|
DESCRIPTION: This article discusses common power
|
|||
|
anomalies and equipment available to overcome them.
|
|||
|
|
|||
|
|
|||
|
GENERAL SECURITY
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Back-up Facilities
|
|||
|
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April 1984
|
|||
|
PAGE NUMBER(S): 19-22
|
|||
|
CATEGORY: General Security
|
|||
|
DESCRIPTION: This article discusses the options of
|
|||
|
back-up sites including cold sites, hot sites, or
|
|||
|
empty shell, or fully equipped recovery sites. Also
|
|||
|
refers to the extent of equipment, space, and
|
|||
|
services provided by these back-up facilities.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security: Issues and
|
|||
|
Answers
|
|||
|
|
|||
|
NAME OF PERIODICAL: Datamation
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: September 15, 1984
|
|||
|
PAGE NUMBER(S): 16 Pages
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: This 16-page section sponsored by the
|
|||
|
Computer Security Institute contains several
|
|||
|
articles that cover a variety of computer security
|
|||
|
issues.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security: Issues and
|
|||
|
Answers
|
|||
|
|
|||
|
NAME OF PERIODICAL: Datamation
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: September 15 1985
|
|||
|
PAGE NUMBER(S): 24 Pages
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: This advertisement section contains
|
|||
|
eight articles that discuss a variety of computer
|
|||
|
security issues. The authors include FBI Director
|
|||
|
William Webster and Department of Defense Computer
|
|||
|
Security Center Director Robert Brotzman.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Making The Case For Computer
|
|||
|
Security Pure and Simple
|
|||
|
|
|||
|
NAME OF PERIODICAL: Datamation
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: September 1983
|
|||
|
PAGE NUMBER(S):
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: This section of Datamation is sponsored
|
|||
|
by the Computer Security Institute and covers a
|
|||
|
broad range of computer security issues in several
|
|||
|
different articles.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Personal Computers vs. Data
|
|||
|
Data Security: the Two Need
|
|||
|
Not Be Incompatible
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 12
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: Winter 1988
|
|||
|
PAGE NUMBER(S): 24-26
|
|||
|
CATEGORY: General Security
|
|||
|
DESCRIPTION: This article discusses the threat of
|
|||
|
data loss either intentional or unintentional. It
|
|||
|
examines the significant risks and the data security
|
|||
|
policies to lower these risks.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Protecting Information and
|
|||
|
Interest
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computer Management
|
|||
|
|
|||
|
VOLUME OF PERIODICAL:
|
|||
|
NUMBER OF PERIODICAL:
|
|||
|
ISSUE DATE: October 1981
|
|||
|
PAGE NUMBER(S): 33-34, 36
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: Suppliers, consultants, and services
|
|||
|
related to computer security are listed in this
|
|||
|
directory.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Simple Security Precautions
|
|||
|
Ensure Information Safety
|
|||
|
|
|||
|
NAME OF PERIODICAL: Computerworld
|
|||
|
|
|||
|
VOLUME OF PERIODICAL: 19
|
|||
|
NUMBER OF PERIODICAL: 17
|
|||
|
ISSUE DATE: April 1985
|
|||
|
PAGE NUMBER(S): SR-38
|
|||
|
CATEGORY: General Security
|
|||
|
|
|||
|
DESCRIPTION: This article applies many of the
|
|||
|
security precautions for mainframes to the
|
|||
|
microcomputer.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MICROCOMPUTER SECURITY
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Memo: Disaster Plan For
|
|||
|
Microcomputer Users
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April 1984
|
|||
|
PAGE NUMBER(S): 27-29
|
|||
|
CATEGORY: Microcomputer Security
|
|||
|
DESCRIPTION: This article is in the form a memo
|
|||
|
containing a microcomputer disaster recovery
|
|||
|
checklist. It address issues that should be taken in
|
|||
|
contingency plans.
|
|||
|
|
|||
|
|
|||
|
PHYSICAL SECURITY AND HARDWARE
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Media Safes: Countering the
|
|||
|
Threats of Fire
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 6
|
|||
|
ISSUE DATE: July/August 1985
|
|||
|
PAGE NUMBER(S): 18-20
|
|||
|
CATEGORY: Physical Security & Hardware
|
|||
|
DESCRIPTION: This article is a review of critical
|
|||
|
basic information on how to select fire resistant
|
|||
|
media safes.
|
|||
|
|
|||
|
|
|||
|
RISK MANAGEMENT
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Protecting The World's Largest
|
|||
|
Computer User
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April 1984
|
|||
|
PAGE NUMBER(S): 25-26
|
|||
|
CATEGORY: Risk Management
|
|||
|
DESCRIPTION: This article discusses a new high
|
|||
|
security off-site storage facility opening in
|
|||
|
Beltsville, Maryland. It also address concern with
|
|||
|
the lack of proper security storage today.
|
|||
|
|
|||
|
|
|||
|
SECURITY MANAGEMENT
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security Awareness:
|
|||
|
Organizations and Senior
|
|||
|
Management Concerns
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May/June 1984
|
|||
|
PAGE NUMBER(S): 12-13
|
|||
|
CATEGORY: Security Management
|
|||
|
DESCRIPTION: This article gives the result of a
|
|||
|
survey of general security and computer security
|
|||
|
personnel, EDP auditors, and internal auditors to
|
|||
|
determine the computer security awareness of their
|
|||
|
company and senior management.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Records Storage and Management
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 4
|
|||
|
ISSUE DATE: March/April 1984
|
|||
|
PAGE NUMBER(S): 23-25
|
|||
|
CATEGORY: Security Management
|
|||
|
DESCRIPTION: This article addresses the questions
|
|||
|
which records should be stored off-site, and how
|
|||
|
can an off-site facility be evaluated? It also
|
|||
|
provides an overview of areas to consider.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SOFTWARE AND OPERATING SYSTEM SECURITY
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security Software
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 1
|
|||
|
ISSUE DATE: September/October 1984
|
|||
|
PAGE NUMBER(S): 19-24
|
|||
|
CATEGORY: Software & Operating System Security
|
|||
|
DESCRIPTION: This article provides information for
|
|||
|
using access control software to protect the
|
|||
|
terminals, the data and the system itself from
|
|||
|
unauthorized use.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Computer Security Software
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 9
|
|||
|
NUMBER OF PERIODICAL: 3
|
|||
|
ISSUE DATE: 1985 Buyer's Directory
|
|||
|
PAGE NUMBER(S): 17-18
|
|||
|
CATEGORY: Software and Operating System Security
|
|||
|
DESCRIPTION: This article addresses a wide variety
|
|||
|
of computer security software programs and their
|
|||
|
different uses.
|
|||
|
|
|||
|
|
|||
|
AUTHOR: Not Specified
|
|||
|
|
|||
|
TITLE OF ARTICLE: Protecting Software With
|
|||
|
Escrow Services
|
|||
|
|
|||
|
NAME OF PERIODICAL: Data Processing &
|
|||
|
Communications Security
|
|||
|
VOLUME OF PERIODICAL: 8
|
|||
|
NUMBER OF PERIODICAL: 5
|
|||
|
ISSUE DATE: May/June 1984
|
|||
|
PAGE NUMBER(S): 22-24
|
|||
|
CATEGORY: Software & Operating System Security
|
|||
|
DESCRIPTION: This article addresses some of the
|
|||
|
problems and answers for protecting software that
|
|||
|
concerns major management today.
|
|||
|
|
|||
|
|