Is your computer insecure?
- 1 January 1972
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Spectrum
- Vol. 9 (1) , 67-78
- https://doi.org/10.1109/mspec.1972.5218476
Abstract
Sleepless nights face the data-processing manager who attempts to identify the many destructive fates that can await his computer center: fraud, hardware and software failures, operator errors, input errors, programming errors, magnetic erasure, electromagnetic and acoustic monitoring . . . Hardware and software techniques to prevent such disasters as leakage of private information, penetration of a computerized information center, and the alteration or destruction of a data base are surveyed in this article. Areas of concern include remote-terminal access, cryptography, the communication subsystem, threat monitoring, processing controls, certification, and the internal audit.Keywords
This publication has 7 references indexed in Scilit:
- A hardware architecture for implementing protection ringsPublished by Association for Computing Machinery (ACM) ,1971
- The formulary model for flexible privacy and access controlsPublished by Association for Computing Machinery (ACM) ,1971
- Hardware aspects of secure computingPublished by Association for Computing Machinery (ACM) ,1970
- Computers and Privacy: A SurveyACM Computing Surveys, 1969
- Security and privacy in computer systemsPublished by Association for Computing Machinery (ACM) ,1967
- System implications of information privacyPublished by Association for Computing Machinery (ACM) ,1967
- A brief description of privacy measures in the RUSH time-sharing systemPublished by Association for Computing Machinery (ACM) ,1967