The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Is Your Computer Insecure?

Author

Charles W. Beardsley

Entry type

techreport

Abstract

Sleepless nights face the data-processing manager who attempts to identify the many destructive fates that can await his computer center: fraud, hardware and software failures, operator errors, input errors, programming errors, magnetic erasure, electromagnetic and acoustic monitoring. . . Hardware and software techniques to prevent such disasters as leakage of private information, penetration of a computerized information center, and the alteration or destruction of a data base are surveyed in this article. Areas of concern include remote-terminal access, cryptography, the communication subsystem, threat monitoring, processing controls, certification, and the internal audit.

Date

1972 – January

Institution

IEEE Spectrum

Key alpha

Beardsley

Pages

67-78

Publication Date

0000-00-00

Location

A hard-copy of this is in the Papers Cabinet

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.