|
BIBLIOGRAPHY OF COMPUTER SECURITY ARTICLES 1983 THROUGH 1988 (Note: A bibliograpghy is now being developed to encompass 1989.) AUTHORS SPECIFIED ABUSE/MISUSE/CRIME AUTHOR: Associated Press TITLE OF ARTICLE: Jury Selection In 1st "Virus" Trial Begins NAME OF PERIODICAL: Washington Post VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: 277 ISSUE DATE: September 7, 1988 PAGE NUMBER(S): C1 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article is about a programmer accused of using a computer "virus" to sabotage thousands of records at his former work place. AUTHOR: Atkinson, L.V. TITLE OF ARTICLE: Fraud: Input Data Most Vulnerable NAME OF PERIODICAL: Computerworld UK VOLUME OF PERIODICAL: 2 NUMBER OF PERIODICAL: 21 ISSUE DATE: September 2, 1981 PAGE NUMBER(S): 10 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: Article discusses a survey which found that the major danger to computers was the alteration of input data. AUTHOR: Baker, R.H. TITLE OF ARTICLE: Lining Up Computer Crooks NAME OF PERIODICAL: Micro Communications VOLUME OF PERIODICAL: 2 NUMBER OF PERIODICAL: 5 ISSUE DATE: May 1985 PAGE NUMBER(S): 18-22 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article looks at crime patterns of microcomputer users breaking into mainframes. Ways in which these patterns can be learned and then stopped is discussed. AUTHOR: Bequai, A. TITLE OF ARTICLE: What to do About Crime in the Electronic Office NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: 101 NUMBER OF PERIODICAL: 1 ISSUE DATE: January 1985 PAGE NUMBER(S): 101-104 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article discusses the important role that auditing computer systems plays in preventing crimes and abuse. AUTHOR: Betts, M. TITLE OF ARTICLE: Government's Computers "Highly Vulnerable" to Abuse NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 18 NUMBER OF PERIODICAL: 40 ISSUE DATE: October 1984 PAGE NUMBER(S): 4 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: Discusses how highly vulnerable the federal government's computers are to abuse, and a congressman who is seeking to change that vulnerability. AUTHOR: Blakeney, S. TITLE OF ARTICLE: Computer Crime: A Worldwide Concern NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 17, 18 NUMBER OF PERIODICAL: 52, 1 ISSUE DATE: December 26, 1983, January 1984 PAGE NUMBER(S): 57-60 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article looks at computer crime as a worldwide problem. The most common types of computer crimes are given along with the estimated losses in various countries throughout the world. AUTHOR: Bologna, Jack TITLE OF ARTICLE: Computer Related Crime: The Who, What, Where, When, Why and How NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 10 NUMBER OF PERIODICAL: 1 ISSUE DATE: Winter 1986 PAGE NUMBER(S): 19-23 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article looks at computer related crime from the perspectives of the individual criminal, environmental factors, organization cultures, incidence rate, and security countermeasures. AUTHOR: Bramer, W.L. TITLE OF ARTICLE: Computer and Data Security is Battle Cry to the '80s NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: 103 NUMBER OF PERIODICAL: 3 ISSUE DATE: March 1986 PAGE NUMBER(S): 78-82 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article discusses the number of organizations that are looking at their security procedures and programs to deter computer abuse. The three main causes of security problems are described. AUTHOR: Carey, Cameron TITLE OF ARTICLE: Data Access Control: Help or Hindrance NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 11 NUMBER OF PERIODICAL: 4 ISSUE DATE: Fall 1987 PAGE NUMBER(S): 18-20 CATEGORY: Access Control DESCRIPTION: This article discusses limiting access to data and how to make access control protection more of a help than a hindrance by developing a set of priorities about various classes of data. AUTHOR: Edwards, M. TITLE OF ARTICLE: The Sting in a Micro's Tail NAME OF PERIODICAL: Practical Computing VOLUME OF PERIODICAL: 6 NUMBER OF PERIODICAL: 12 ISSUE DATE: December 1983 PAGE NUMBER(S): 108-109 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: How criminals exploit information technology is described in this article along with ways to stop them. AUTHOR: Elmer-Dewitt, Phillip TITLE OF ARTICLE: Invasion of the Data Snatchers! NAME OF PERIODICAL: Time Magazine VOLUME OF PERIODICAL: 123 NUMBER OF PERIODICAL: 13 ISSUE DATE: September 26, 1988 PAGE NUMBER(S): 62-67 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: Discusses the current threat to computer systems posed by computer viruses. Computer viruses are defined and several examples of viruses are given. AUTHOR: Johnson, B. TITLE OF ARTICLE: Criminal Minds Keep Pace with Technology. Stop, Thief! NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 15, 16 NUMBER OF PERIODICAL: 52, 1 ISSUE DATE: December 28, 1981, January 4, 1982 PAGE NUMBER(S): CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article looks at some of the common problems that the DP industry faces today including computer security, asset protection, and computer fraud prevention. AUTHOR: Kluepfel, Henry M. TITLE OF ARTICLE: Computer Security for the Abuser Friendly Environment NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 2 ISSUE DATE: November/December 1984 PAGE NUMBER(S): 16-20 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article discusses the underlying lack of adequate controls in computer systems and their relation to computer abuse and crime. AUTHOR: Kull, D. TITLE OF ARTICLE: How to Make Even E.F. Hutton Listen NAME OF PERIODICAL: Computer Decisions VOLUME OF PERIODICAL: 17 NUMBER OF PERIODICAL: 18 ISSUE DATE: September 1985 PAGE NUMBER(S): 42-50 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: The most effective way for an organization to prevent breaches in a computer system is to plug the holes that have already been used to violate the system and identify the intruders. AUTHOR: Lasden, Martin TITLE OF ARTICLE: Computer Crime NAME OF PERIODICAL: Computer Decisions VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: June 1981 PAGE NUMBER(S): 104-106, 108 112, 116, 118, 120, 122, 124 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article discusses actual computer crimes that have taken place and the factors that escalate the risk of an organization from these types of crime. AUTHOR: Lucas, D. TITLE OF ARTICLE: The Invisible Enemy NAME OF PERIODICAL: Business Computing and Communication VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: February 1985 PAGE NUMBER(S): 18-20 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article describes how home computer users are breaking into some of Britain's mainframe computers. Various procedures that can protect against intrusion are also discussed by the author. AUTHOR: McKibbin, W.L. TITLE OF ARTICLE: Who Gets The Blame For Computer Crime NAME OF PERIODICAL: Infosystems VOLUME OF PERIODICAL: 30 NUMBER OF PERIODICAL: 7 ISSUE DATE: July 1983 PAGE NUMBER(S): 34-36 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: MIS managers are ultimately responsible for the security of their computers. Since they are responsible they should make sure upper management is aware of the vulnerabilities of their computers. AUTHOR: Mylott, T.R. TITLE OF ARTICLE: Computer Security and the Threats from Within NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: 101 NUMBER OF PERIODICAL: 3 ISSUE DATE: March 1985 PAGE NUMBER(S): 45-46, 190 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article explains that the greatest computer-related danger to a company may be from internal threats by employees. AUTHOR: White, L. TITLE OF ARTICLE: Data Security - You Can't Work Without It NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 11A ISSUE DATE: March 1985 PAGE NUMBER(S): 27-30 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: The problem of the disgruntled employee or ex-employee who sabotages a computer system is seen as more of a threat than an outside hacker. AUTHOR: Zalud, Bill TITLE OF ARTICLE: Security and DP Cooperate to Attack Computer Crime NAME OF PERIODICAL: Security VOLUME OF PERIODICAL: 24 NUMBER OF PERIODICAL: 10 ISSUE DATE: October 1987 PAGE NUMBER(S): 52-56, & 58 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article stresses teamwork as computer crime becomes a company fact of life by effectively cuts across a number of functional areas. ACCESS CONTROL AUTHOR: Avarne, Simon TITLE OF ARTICLE: How to Find Out a Password NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 12 NUMBER OF PERIODICAL: 2 ISSUE DATE: Spring 1988 PAGE NUMBER(S): 16-17 CATEGORY: Access Control DESCRIPTION: This article gives examples of how to discover someones password and discusses weaknesses of traditional passwords. AUTHOR: Betts, M. TITLE OF ARTICLE: NBS Releases Standards For Managing Password Security NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 28 ISSUE DATE: July 1985 PAGE NUMBER(S): 19 CATEGORY: Access Control DESCRIPTION: This article talks about how the National Bureau of Standards has completed a two- part publication dealing with password systems. AUTHOR: Bowmen, Terry TITLE OF ARTICLE: Undercarpet Fiber Optics NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 11 NUMBER OF PERIODICAL: 2 ISSUE DATE: Spring 1987 PAGE NUMBER(S): 23-26 CATEGORY: Access Control DESCRIPTION: This article discusses how fiber optics offer better security than copper cable undercarpet. It also includes how to plan an undercarpet system. AUTHOR: Clyde, Allen R. TITLE OF ARTICLE: Insider Threat on Automated Information Systems NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 11 NUMBER OF PERIODICAL: 4 ISSUE DATE: Fall 1987 PAGE NUMBER(S): 11-14 CATEGORY: Access Control DESCRIPTION: This articles discusses activities to detect sources of abuse that are not widely implemented. AUTHOR: Davidson, Thomas L. and White, Clinton E. Jr. TITLE OF ARTICLE: How to Improve Network Security NAME OF PERIODICAL: Infosystems VOLUME OF PERIODICAL: 30 NUMBER OF PERIODICAL: 6 ISSUE DATE: June 1983 PAGE NUMBER(S): 110-112 CATEGORY: Access Control DESCRIPTION: This article discusses the need to protect network systems using software locks, authorization schemes, logs, and data encryption. AUTHOR: Diamond, F.H. TITLE OF ARTICLE: Computer Network Security: The Need Was Never Greater NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: 102 NUMBER OF PERIODICAL: 2 ISSUE DATE: August 1985 PAGE NUMBER(S): 94-99 CATEGORY: Access Control DESCRIPTION: This article discusses the advantages of using the callback approach in computer networks to prevent hackers from getting onto a system. AUTHOR: Fisher, M.J. TITLE OF ARTICLE: New Security Device "Fingers" Culprit NAME OF PERIODICAL: MIS Week VOLUME OF PERIODICAL: 6 NUMBER OF PERIODICAL: 35 ISSUE DATE: September 1985 PAGE NUMBER(S): 12 CATEGORY: Access Control DESCRIPTION: This article describes a new product that uses a fingerprint device to verify a user's identity and then allow access on the computer system. AUTHOR: Horgan, J. TITLE OF ARTICLE: Thwarting The Information Thiefs NAME OF PERIODICAL: IEEE Spectrum VOLUME OF PERIODICAL: 22 NUMBER OF PERIODICAL: 7 ISSUE DATE: July 1985 PAGE NUMBER(S): 30-41 CATEGORY: Access Control DESCRIPTION: Many organizations are protecting their communication output from electronic interception by trying to detect and foil the surveillance using a variety of methods. AUTHOR: Jackson, Carl B. TITLE OF ARTICLE: Passwords: Comments from the Information Systems Security Association NAME OF PERIODICAL: Security VOLUME OF PERIODICAL: 24 NUMBER OF PERIODICAL: 7 ISSUE DATE: July 1987 PAGE NUMBER(S): 105 CATEGORY: Access Control DESCRIPTION: Discusses relevant security issues and how to bring an appropriate degree of LAN information security to your organization. AUTHOR: Kontur, J.S. and Letham, L. TITLE OF ARTICLE: Locking Up System Security NAME OF PERIODICAL: Electronic Week VOLUME OF PERIODICAL: 58 NUMBER OF PERIODICAL: 7 ISSUE DATE: February 18, 1985 PAGE NUMBER(S): 68-72 CATEGORY: Access Control DESCRIPTION: This article describes a system that cannot be broken into by unauthorized users. It uses a random-number generator and encryption logic. AUTHOR: Korzeniowski, P. TITLE OF ARTICLE: Security Dynamics Releases Two- Part Security System NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 42 ISSUE DATE: October 1985 PAGE NUMBER(S): 19, 23 CATEGORY: Access Control DESCRIPTION: This article discusses a product Security Dynamics has designed that is an inexpensive security protection device which keeps hackers out of systems. AUTHOR: McCarthy, Charles J. TITLE OF ARTICLE: Passwords NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 10 NUMBER OF PERIODICAL: 4 ISSUE DATE: Fall 1986 PAGE NUMBER(S): 13-14 CATEGORY: Access Control DESCRIPTION: This article discusses the two primary password configurations passwords defined by user, and passwords assigned to a user. It shows the differences between these two from a security view. AUTHOR: Meason, Robert TITLE OF ARTICLE: System Security at the Terminal NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 10 NUMBER OF PERIODICAL: 4 ISSUE DATE: Fall 1986 PAGE NUMBER(S): 16-17 CATEGORY: Access Control DESCRIPTION: This article discusses considerations of MIS management protection of the processor from access by unauthorized users. AUTHOR: Muzerall, Joseph V. and Carty, Thomas J. TITLE OF ARTICLE: COMSEC and Its Need for Key Management NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 11 NUMBER OF PERIODICAL: 2 ISSUE DATE: Spring 1987 PAGE NUMBER(S): 11-14 CATEGORY: Access Control DESCRIPTION: This article explains the establishment of a standard set of protection mechanisms for both the classified and private user communities. AUTHOR: Schiller, Michael TITLE OF ARTICLE: Security at the Touch of a Finger NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 6 ISSUE DATE: July/August 1985 PAGE NUMBER(S): 15-17 CATEGORY: Access Control DESCRIPTION: This article discusses using biometric security systems for high-tech solutions to access control problems. AUTHOR: Schmonsees, Robert J. TITLE OF ARTICLE: Identification and Authentication: The Security Challenge of the 80's NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April, 1985 PAGE NUMBER(S): 22-23 CATEGORY: Access Control DESCRIPTION: This article discusses the computer security issues of identification and authentication showing the common problems and offering some suggestions for improving by random passcode. AUTHOR: Stieglitz, M. TITLE OF ARTICLE: Security For Shared Resources NAME OF PERIODICAL: Micro Communications VOLUME OF PERIODICAL: 2 NUMBER OF PERIODICAL: 6 ISSUE DATE: June 1985 PAGE NUMBER(S): 19-26 CATEGORY: Access Control DESCRIPTION: This article discusses data security products and procedures for network use. Includes description of encryption techniques that are now popular. AUTHOR: Wood, Charles Cresson TITLE OF ARTICLE: A New Approach to Computer User Authentication NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 10 NUMBER OF PERIODICAL: 4 ISSUE DATE: Fall 1986 PAGE NUMBER(S): 21-26 CATEGORY: Access Control DESCRIPTION: This article gives a new approach to authentication called dial-guard. It addresses the two problems of password/users IDs not providing sufficient security and identifying the location of dial-up users. AUTHOR: Wood, Charles Cresson TITLE OF ARTICLE: Information Security with One-Way Functions NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 5 ISSUE DATE: May/June 1985 PAGE NUMBER(S): 14-16 CATEGORY: Access Control DESCRIPTION: This article explains how one-way functions can be used to safeguard information that is too sensitive to be protected via encryption. AUDIT AND EVALUATION AUTHOR: Berman, A. TITLE OF ARTICLE: Evaluating On-Line Computer Security NAME OF PERIODICAL: Data Communications VOLUME OF PERIODICAL: 12 NUMBER OF PERIODICAL: 7 ISSUE DATE: July 1983 PAGE NUMBER(S): 145-152 CATEGORY: Audit and Evaluation DESCRIPTION: The security problems that have arisen because of on-line processing are discussed in this article. Covered are the two ways to obtain a secure on-line system. AUTHOR: Betts, M. TITLE OF ARTICLE: U.S. Agency Faces Probes, Boosts Security After Audit NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 24 ISSUE DATE: June 1985 PAGE NUMBER(S): 8 CATEGORY: Audit and Evaluation DESCRIPTION: This article discusses an audit report issued by the inspector general of the U.S. Department of the Interior in March 1985 which revealed inadequate controls over passwords, faulty operating procedures, and lack of audit trails by the Denver Service Center. AUTHOR: Bologna, Jack TITLE OF ARTICLE: Forensic Accounting NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 6 ISSUE DATE: July/August 1984 PAGE NUMBER(S): 16-20 CATEGORY: Audit and Evaluation DESCRIPTION: This article identifies the skills and competency of a forensic accountant. AUTHOR: Flach, Joseph P. TITLE OF ARTICLE: Increasing Programming Efficiency While Preventing the "F" Word NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 11 NUMBER OF PERIODICAL: 4 ISSUE DATE: Fall 1987 PAGE NUMBER(S): 15-17 CATEGORY: Audit and Evaluation DESCRIPTION: This article gives examples of ways to identify fraudulent code in a production program. AUTHOR: Gaydasch, Alexander TITLE OF ARTICLE: Postimplementation Audits - A Quick, Easy Approach NAME OF PERIODICAL: Data Management VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: February 1983 PAGE NUMBER(S): 54, 55, 69 CATEGORY: Audit and Evaluation DESCRIPTION: This article describes post- implementation audits and how they help to determine whether a computer system has met its original criteria. CONTINGENCY PLANNING AUTHOR: Cabell, D. TITLE OF ARTICLE: Network Backups NAME OF PERIODICAL: Micro Communications VOLUME OF PERIODICAL: 2 NUMBER OF PERIODICAL: 6 ISSUE DATE: June 1985 PAGE NUMBER(S): 14-18 CATEGORY: Contingency Planning DESCRIPTION: This article describes how the only way to protect a LAN, micro, mini, or mainframe from a complete system crash is adequate backup. AUTHOR: Ciura, J.M. TITLE OF ARTICLE: Vital Records Protection: Identifying Essential Information NAME OF PERIODICAL: Information Management VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 2 ISSUE DATE: February 1985 PAGE NUMBER(S): 11 CATEGORY: Contingency Planning DESCRIPTION: This article suggest that the best way to resume business activity after an emergency or disaster is to have a vital records protection program. AUTHOR: Clauss, Karl H. TITLE OF ARTICLE: How To Move A Data Center and Avoid a Disaster NAME OF PERIODICAL: Infosystems VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: December 1981 PAGE NUMBER(S): 46-48, 50 CATEGORY: Contingency Planning DESCRIPTION: This article describes how ARCO Oil and Gas Company moved their computer center to a new location and the points a company should consider when moving a data center. AUTHOR: Dobberstein, M. TITLE OF ARTICLE: To Have and Not to Have a Disaster NAME OF PERIODICAL: Computer Decisions VOLUME OF PERIODICAL: 17 NUMBER OF PERIODICAL: 18 ISSUE DATE: September 1985 PAGE NUMBER(S): 102-126 CATEGORY: Contingency Planning DESCRIPTION: This article deals with the importance of actually testing contingency plans to see if they work. AUTHOR: Minoli, D. TITLE OF ARTICLE: Backup Needs Merit Special Attention NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 15 ISSUE DATE: April 1985 PAGE NUMBER(S): 91, 96 CATEGORY: Contingency Planning DESCRIPTION: This article focuses on the merits of backing up a data center to prevent a major disaster from critically affecting a company. AUTHOR: Pujals, J.M. TITLE OF ARTICLE: What is a Contingency Plan? NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 12 NUMBER OF PERIODICAL: 1 ISSUE DATE: Winter 1988 PAGE NUMBER(S): 19-23 CATEGORY: Contingency Planning DESCRIPTION: This article tells how to construct a contingency plan and goes over the major mandatory steps that have to be taken to end up with a workable product. AUTHOR: Raimondi, D. TITLE OF ARTICLE: E.F. Hutton Underscores Practicality in Backup Plan NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 15 ISSUE DATE: April 1985 PAGE NUMBER(S): 19 CATEGORY: Contingency Planning DESCRIPTION: Describes how E.F. Hutton has built a new computer room as part of its disaster recovery plan. AUTHOR: Rames, David TITLE OF ARTICLE: Recovering From Disasters NAME OF PERIODICAL: Computer Decisions VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: September 1981 PAGE NUMBER(S): 108-110, 112, 114, 120, 122, 124, 126-131, 188-189 CATEGORY: Contingency Planning DESCRIPTION: Described in this article are criteria for developing an emergency backup plan and examples of emergency backup alternatives. AUTHOR: Scoma, Louis TITLE OF ARTICLE: How Secure Is Your Computer Operation From A Disaster NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: August 1981 PAGE NUMBER(S): 96, 98 CATEGORY: Contingency Planning DESCRIPTION: The failures of companies to protect their computer centers is discussed along with the need for recovery systems to serve as backup security. AUTHOR: Wolbrecht, J.E. TITLE OF ARTICLE: Can Your Records Storage Center Stand a Disaster NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: 102 NUMBER OF PERIODICAL: 3 ISSUE DATE: September 1985 PAGE NUMBER(S): 112-113 CATEGORY: Contingency Planning DESCRIPTION: A manager's responsibility to protect a records storage center by recognizing vulnerable areas and making them more secure is discussed. DATABASE MANAGEMENT AUTHOR: Pieper, Oscar R. TITLE OF ARTICLE: Voice Authentication Wages A War on Data Base Fraud NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 6 ISSUE DATE: July/August 1984 PAGE NUMBER(S): 12-13 CATEGORY: Data Base Security DESCRIPTION: This article reviews the present state of voice authentication technology and how it applies to secure data bases from bogus intruders. ENVIRONMENTAL SECURITY AUTHOR: Lemke, Fred H. TITLE OF ARTICLE: Blackouts and Computer Power Protection NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 12 NUMBER OF PERIODICAL: 2 ISSUE DATE: Spring 1988 PAGE NUMBER(S): 19-23 CATEGORY: Environmental Security DESCRIPTION: This article is a study that was taken to see emerging patterns of blackouts that may be useful in helping evaluate your level of blackout vulnerability and then set up appropriate levels of power protection for your electronic systems. AUTHOR: Lemke, Fred H. TITLE OF ARTICLE: Computer Power Protection NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April 1984 PAGE NUMBER(S): 31-33 CATEGORY: Environmental Security DESCRIPTION: This article gives examples of how to protect your facility against the harmful effects of an electrical power outage. AUTHOR: McGowan, Kevin J. TITLE OF ARTICLE: Computer Power Protection NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 5 ISSUE DATE: May/June 1985 PAGE NUMBER(S): 21-25 CATEGORY: Environmental Security DESCRIPTION: This article looks at understanding AC power conditions in data processing site preparation and its criticality for preventing future computer downtime and disruptions. GENERAL SECURITY AUTHOR: Beitman, L. TITLE OF ARTICLE: A Practical Guide To Small Business Computer Security NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: 96 NUMBER OF PERIODICAL: 2 ISSUE DATE: August 1982 PAGE NUMBER(S): 86, 90 CATEGORY: General Security DESCRIPTION: This article gives advice on how to obtain computer security in a small business environment. A checklist is included that will help to prevent accidental and intentional harm to a system. AUTHOR: Collins, J.A. TITLE OF ARTICLE: Continuous Security Control Clamps Down on Abuse NAME OF PERIODICAL: Data Management VOLUME OF PERIODICAL: 23 NUMBER OF PERIODICAL: 5 ISSUE DATE: May 1985 PAGE NUMBER(S): 56-59 CATEGORY: General Security DESCRIPTION: The need for computer access is discussed in this article that suggest that such access should be a management, security-oriented process. Computer security guidelines are also given. AUTHOR: Coontz, Constance TITLE OF ARTICLE: Protection through Isolation NAME OF PERIODICAL: Security Management VOLUME OF PERIODICAL: 31 NUMBER OF PERIODICAL: 11 ISSUE DATE: November 1987 PAGE NUMBER(S): 53-55 CATEGORY: General Security DESCRIPTION: This article discusses compartmentalizing valuable data on dedicated PCs or small computer systems to help protect it from hackers and moles. AUTHOR: Gazarek, Kenneth F. TITLE OF ARTICLE: Cabinets for Electromagnetic Interference/Radio-Frequency Interference and TEMPEST Shielding NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 6 ISSUE DATE: July/August 1985 PAGE NUMBER(S): 12-13 CATEGORY: General Security DESCRIPTION: This article discusses the electromagnetic interference and radio-frequency interference control options, designing and building metal cabinets that provide effective shielding. AUTHOR: Lobel, J. TITLE OF ARTICLE: Third Decade of Concern NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 16 NUMBER OF PERIODICAL: 6 ISSUE DATE: February 8, 1982 PAGE NUMBER(S): 1D/31-34 & 36 CATEGORY: General Security DESCRIPTION: The author looks at some of the issues associated with distributed data processing including privacy, crime, and security. AUTHOR: Miskiewicz, J. TITLE OF ARTICLE: DP Security: A Delicate Balance NAME OF PERIODICAL: Computer Decisions VOLUME OF PERIODICAL: 17 NUMBER OF PERIODICAL: 8 ISSUE DATE: April 1985 PAGE NUMBER(S): 104-106 CATEGORY: General Security DESCRIPTION: This article discusses the delicate balance between protecting vital resources in a data processing facility and enhancing productivity. AUTHOR: Moulton, R. TITLE OF ARTICLE: Prevention: Better Than Prosecution NAME OF PERIODICAL: Government Data Systems VOLUME OF PERIODICAL: 10 NUMBER OF PERIODICAL: 6 ISSUE DATE: November/December 1981 PAGE NUMBER(S): 20 & 22-23 CATEGORY: General Security DESCRIPTION: The focus of this paper is on deterrence of computer abuse, whether it is unintentional or intentional. AUTHOR: Parker, D.B. TITLE OF ARTICLE: The Many Faces of Data Vulnerability NAME OF PERIODICAL: IEEE Spectrum VOLUME OF PERIODICAL: 21 NUMBER OF PERIODICAL: 5 ISSUE DATE: May 1984 PAGE NUMBER(S): 46-49 CATEGORY: General Security DESCRIPTION: Discussed in this paper are both the need for new computer security methods and the attainable limits that can be reached by computer security. AUTHOR: Rosch, W. TITLE OF ARTICLE: Three Products Help Cork Computer Leaks, Feature Blocked Access, Disk-File Encryption NAME OF PERIODICAL: PC Week VOLUME OF PERIODICAL: 2 NUMBER OF PERIODICAL: 18 ISSUE DATE: May 1985 PAGE NUMBER(S): 122-124 CATEGORY: General Security DESCRIPTION: This article discusses a trio of products to help prevent unauthorized access to a computer system. AUTHOR: Rosen, Richard D. and Dvorsky, James TITLE OF ARTICLE: Portable Data Carrier Technology NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 12 NUMBER OF PERIODICAL: 1 ISSUE DATE: Winter 1988 PAGE NUMBER(S): 9-19 CATEGORY: General Security DESCRIPTION: This article presents an overview of the general field of portable data carrier technology. Included are not only smart cards but other devices and systems that are beginning to emerge in the marketplace. AUTHOR: Srinivasan, C.A. and Dascher, P.E. TITLE OF ARTICLE: Computer Security and Integrity: Problems and Prospects NAME OF PERIODICAL: Infosystems VOLUME OF PERIODICAL: 28 NUMBER OF PERIODICAL: 5 ISSUE DATE: May 1981 PAGE NUMBER(S): 5 Pages CATEGORY: General Security DESCRIPTION: Various aspects of computer security are discussed including data security, data privacy, data integrity, etc. AUTHOR: Weller, Reginald H. TITLE OF ARTICLE: Off-Site Data Storage: A Changing Industry NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 5 ISSUE DATE: May/June 1985 PAGE NUMBER(S): 18-20 CATEGORY: General Security DESCRIPTION: This article discusses selecting a backup site while meeting the criteria of integrity, reliability, access, reasonable cost, appropriate location, good security, and comprehensive insurance coverage. AUTHOR: Wright, J.R. Jr. TITLE OF ARTICLE: User Responsibility for Security NAME OF PERIODICAL: Government Data Systems VOLUME OF PERIODICAL: 15 NUMBER OF PERIODICAL: 1 ISSUE DATE: December 1985 through January 1986 PAGE NUMBER(S): 52-55 CATEGORY: General Security DESCRIPTION: This article looks at the circular "Management of Federal Information Resources" printed by the Office of Management and Budget. This circular provides guidance to Federal Managers concerning computer security and the associated responsibilities. AUTHOR: Zimmerman, J.S. TITLE OF ARTICLE: Is Your Computer Insecure? NAME OF PERIODICAL: Datamation VOLUME OF PERIODICAL: 31 NUMBER OF PERIODICAL: 10 ISSUE DATE: May 1985 PAGE NUMBER(S): 119-120 CATEGORY: General Security DESCRIPTION: This article challenges widely accepted notions concerning computer security. It suggest that people's views should be changed so that the challenge will be making a security system work instead of beating it. LAW AND ETHICS AUTHOR: Bequai, August TITLE OF ARTICLE: Federal Computer Crime Legislation is Needed NAME OF PERIODICAL: Data Management VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: May 1981 PAGE NUMBER(S): 22-24 CATEGORY: Law & Ethics DESCRIPTION: The ways criminals use loopholes in our present criminal justice system is discussed along with a history of computer crime legislation. AUTHOR: Betts, M. TITLE OF ARTICLE: Reagan Systems Security Directive Under Attack NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 27 ISSUE DATE: July 1985 PAGE NUMBER(S): 1 CATEGORY: Law & Ethics DESCRIPTION: This article discusses why members of congress are concerned over how the National Security Decision Directive 145 on computer security could be abused by military and intelligence officials. AUTHOR: Bigelow, R.P. TITLE OF ARTICLE: Computer Security And Law NAME OF PERIODICAL: Infosystems VOLUME OF PERIODICAL: 29 NUMBER OF PERIODICAL: 12 ISSUE DATE: December 1982 PAGE NUMBER(S): 84 CATEGORY: Law & Ethics DESCRIPTION: This article looks at how a memo from the legal department should be structured concerning the protection of assets. AUTHOR: Hagopian, Greg TITLE OF ARTICLE: Planning and Implementing a Security Package NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 10 NUMBER OF PERIODICAL: 4 ISSUE DATE: Fall 1986 PAGE NUMBER(S): 17-20 CATEGORY: Law & Ethics DESCRIPTION: This article discusses vendor selection and legal issues. AUTHOR: Roberts, J.E. TITLE OF ARTICLE: Filing Software Copyrights NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 36 ISSUE DATE: September 1985 PAGE NUMBER(S): 116 CATEGORY: Law & Ethics DESCRIPTION: This article describes how copyrighting software is accomplished and what copyrighted software means. MICROCOMPUTER SECURITY AUTHOR: Koelle, Jim TITLE OF ARTICLE: What's in the Cards? NAME OF PERIODICAL: Security VOLUME OF PERIODICAL: 23 NUMBER OF PERIODICAL: 12 ISSUE DATE: December 1986 PAGE NUMBER(S): 42-44, and 46 CATEGORY: Microcomputer Security DESCRIPTION: This article discusses microchips and how they promise to revolutionize access card technology with fast, calculating, and advanced memories. AUTHOR: Rhodes, B. TITLE OF ARTICLE: Micro Security That Makes Sense NAME OF PERIODICAL: Computer Decisions VOLUME OF PERIODICAL: 17 NUMBER OF PERIODICAL: 9 ISSUE DATE: May 1985 PAGE NUMBER(S): 72, 74-76 CATEGORY: Microcomputer Security DESCRIPTION: This article describes security procedures that can be used by employees to solve microcomputer security problems. AUTHOR: Zimmerman, J.S. TITLE OF ARTICLE: P.C. Security: So What's New NAME OF PERIODICAL: Datamation VOLUME OF PERIODICAL: 31 NUMBER OF PERIODICAL: 21 ISSUE DATE: November 1985 PAGE NUMBER(S): 89-92 CATEGORY: Microcomputer Security DESCRIPTION: This article looks at the problems data security officers are going to encounter even as they implement safeguards for micros. PHYSICAL SECURITY AND HARDWARE AUTHOR: Call, B. TITLE OF ARTICLE: Buttress Against Computer Crime NAME OF PERIODICAL: PC Week VOLUME OF PERIODICAL: 2 NUMBER OF PERIODICAL: 18 ISSUE DATE: May 1985 PAGE NUMBER(S): 111, 115 CATEGORY: Physical Security & Hardware DESCRIPTION: The physical protection of computers is becoming an area of interest for more organizations. The increased number of physical security devices illustrates this point and is discussed in this article. AUTHOR: Epner, S.A. TITLE OF ARTICLE: Computer Security: Plenty of Questions but No Easy Answers NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: 101 NUMBER OF PERIODICAL: 3 ISSUE DATE: March 1985 PAGE NUMBER(S): 74-76 CATEGORY: Physical Security & Hardware DESCRIPTION: This article covers the physical security of computer equipment including air conditioning and power to pass cards and security guards. PRIVACY AUTHOR: Jordan, Halmuth TITLE OF ARTICLE: The Search for Privacy NAME OF PERIODICAL: Security Management VOLUME OF PERIODICAL: 31 NUMBER OF PERIODICAL: 11 ISSUE DATE: November 1987 PAGE NUMBER(S): 32-36 CATEGORY: Privacy DESCRIPTION: This article focuses on some of the difficulties the legal profession is having by looking at American and West German law regarding electronic surveillance. RISK MANAGEMENT AUTHOR: Armstrong, James R. TITLE OF ARTICLE: Protecting the Corporate Data NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April, 1985 PAGE NUMBER(S): 16-17 CATEGORY: Risk Management DESCRIPTION: This article discusses how most alternative off-site lack the environmental control, security and accessibility needed. Includes a discussion on things to consider in selecting an off-site storage facility. AUTHOR: Bologna, Jack TITLE OF ARTICLE: Disaster/Recovery Planning: A Qualitative Approach NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April 1984 PAGE NUMBER(S): 11-15 CATEGORY: Risk Management DESCRIPTION: Developing a disaster/recovery plan usually involves a detailed quantitative risk analysis; the author offers a more qualitative approach that is less time consuming and will obtain a higher level of commitment from management, D/P staff, and users. AUTHOR: Bologna, Jack TITLE OF ARTICLE: Industrial Security In a Nutshell: A Risk by any Other Name NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 5 ISSUE DATE: May/June 1985 PAGE NUMBER(S): 12-13 CATEGORY: Risk Management DESCRIPTION: This article discusses properly understanding risk and how the opposite side of risk is opportunity for growth and development. AUTHOR: Bologna, Jack TITLE OF ARTICLE: Risk Assessment Guidelines for Fidelity Insurance NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April, 1985 PAGE NUMBER(S): 18-20 CATEGORY: Risk Management DESCRIPTION: This article is a review of the adequacy of asset protection plans, policies, procedures and controls to enlighten top management. AUTHOR: Helsing, Cherly W. TITLE OF ARTICLE: Disaster Recovery Options NAME OF PERIODICAL: Security VOLUME OF PERIODICAL: 24 NUMBER OF PERIODICAL: 7 ISSUE DATE: July 1987 PAGE NUMBER(S): 100-103 CATEGORY: Risk Management DESCRIPTION: This article has suggestions on how to find a recovery plan that fits your firm without damaging your profits. AUTHOR: Linden, Jack TITLE OF ARTICLE: Automated EDP Risk Analysis and Management NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 1 ISSUE DATE: September/October 1984 PAGE NUMBER(S): 16-18 CATEGORY: Risk Management DESCRIPTION: This article gives a cost effective first step in developing a successful computer security program using a cost benefit analysis approach. AUTHOR: Schweig, Barry B. TITLE OF ARTICLE: Decision Matrix: A Risk Handling Decision Aid NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April 1984 PAGE NUMBER(S): 16-18 CATEGORY: Risk Management DESCRIPTION: This article discusses conceptualizing a decision-matrix as an integral component of a risk management process. AUTHOR: Vernick, Paul R. TITLE OF ARTICLE: Providing Data Processing Recovery Backup NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April, 1985 PAGE NUMBER(S): 14-16 CATEGORY: Risk Management DESCRIPTION: This article covers some of the major emergency and recovery planning options available that need to be considered prior to the occurrence of any serious emergency. SECURITY MANAGEMENT AUTHOR: Bologna, Jack TITLE OF ARTICLE: Security Planning: The "Tapps" Method NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 10 NUMBER OF PERIODICAL: 4 ISSUE DATE: Fall 1986 PAGE NUMBER(S): 7-11 CATEGORY: Security Management DESCRIPTION: This article covers a system approach to assets protection. It discusses an analytical process called Total Assets Protection Planning System (TAPPS) which consist of organization, structure and mandate of the security function. AUTHOR: Bologna, Jack TITLE OF ARTICLE: Selling Computer Security to Top Management NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 5 ISSUE DATE: May/June 1984 PAGE NUMBER(S): 13-16 CATEGORY: Security Management DESCRIPTION: This article discusses positive motivational impact, minimizing risk, and cost feasibility in selling computer security to top managers. AUTHOR: Bologna, Jack TITLE OF ARTICLE: Why the Corporate Security Function is Being Downsized NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 11 NUMBER OF PERIODICAL: 2 ISSUE DATE: Spring 1987 PAGE NUMBER(S): 20-21 CATEGORY: Security Management DESCRIPTION: This article discusses the disbanding and dilution of corporate security functions and how this effects the security of a firm. AUTHOR: Goldstein, Bruce TITLE OF ARTICLE: Information Security: The Information Resource Management Approach NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 5 ISSUE DATE: May/June 1984 PAGE NUMBER(S): 18-22 CATEGORY: Security Management DESCRIPTION: This article addresses information as a asset that must be protected as any other asset. It also discusses information research management providing the framework for a comprehensive information security program. AUTHOR: Harris, N.L. TITLE OF ARTICLE: Rigid Administrative Procedures Prevent Computer Security Failure NAME OF PERIODICAL: Data Management VOLUME OF PERIODICAL: 22 NUMBER OF PERIODICAL: 12 ISSUE DATE: December 1984 PAGE NUMBER(S): 13-14, 16 CATEGORY: Security Management DESCRIPTION: The best way to keep a security program from failing is the use of strict administrative procedures. This article also discusses why some systems fail. AUTHOR: Reber, Jan TITLE OF ARTICLE: The Essence of Industrial Espionage NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 10 NUMBER OF PERIODICAL: 1 ISSUE DATE: Winter 1986 PAGE NUMBER(S): 24-25 CATEGORY: Security Management DESCRIPTION: This article discusses understanding espionage by a characteristic all spies have in common "access to the target". SOFTWARE AND OPERATING SYSTEM SECURITY AUTHOR: Adler, Stacy TITLE OF ARTICLE: 7 Myths of Computer Security NAME OF PERIODICAL: Security VOLUME OF PERIODICAL: 24 NUMBER OF PERIODICAL: 1 ISSUE DATE: January 1987 PAGE NUMBER(S): 50-52 CATEGORY: Software & Operating System Security DESCRIPTION: This article covers consultants that clear misconceptions about data protection software. AUTHOR: Edwards, J. TITLE OF ARTICLE: Ends in Sight for the Copy-Protection Debate NAME OF PERIODICAL: PC Week VOLUME OF PERIODICAL: 3 NUMBER OF PERIODICAL: 1 ISSUE DATE: January 1986 PAGE NUMBER(S): 101 & 105 CATEGORY: Software & Operating System Security DESCRIPTION: This protection of software from unauthorized use may be coming to an end as Microsoft Corporation has decided to lift the protection from several of its software programs. AUTHOR: Koreniowski, P. TITLE OF ARTICLE: Adapso Making Progress on Software Protection Device NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 24 ISSUE DATE: June 1985 PAGE NUMBER(S): 8 CATEGORY: Software & Operating System Security DESCRIPTION: This article discusses how the Association of Data Processing Service Organizations (ADAPSO) is getting ready to announce its progress in creating a software authorization mechanism. AUTHOR: Schriever, Joe F. TITLE OF ARTICLE: Structuring for Security NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 1 ISSUE DATE: September/October 1984 PAGE NUMBER(S): 14-16 CATEGORY: Software & Operating System Security DESCRIPTION: This article is a set of guidelines that will remove ambiguities as to what will be done by whom to provide system security. TRAINING AND AWARENESS AUTHOR: Bezdek, J. TITLE OF ARTICLE: Across-the-Board Training Protects Data NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 18 NUMBER OF PERIODICAL: 44 ISSUE DATE: October 1984 PAGE NUMBER(S): SR-10 CATEGORY: Training & Awareness DESCRIPTION: This special report covers the four areas that a training program in computer security needs to include. These are plant physical security, logical security, administrative security, and the legal and social aspects of security training. AUTHOR: Bound, W.A.J. TITLE OF ARTICLE: Security Protecting Information Resources and Media NAME OF PERIODICAL: Information Management VOLUME OF PERIODICAL: 18 NUMBER OF PERIODICAL: 8 ISSUE DATE: August 1984 PAGE NUMBER(S): 18-19 CATEGORY: Training & Awareness DESCRIPTION: This article discusses what a manager must consider when designing an office security program to protect against the four vulnerabilities of a system: personnel, physical, administrative, and technical. AUTHOR: Johnston, R.E. TITLE OF ARTICLE: What You Need To Know NAME OF PERIODICAL: Infosystems VOLUME OF PERIODICAL: 32 NUMBER OF PERIODICAL: 1 ISSUE DATE: January 1985 PAGE NUMBER(S): 56 CATEGORY: Training & Awareness DESCRIPTION: Outlined in this article are those things that should be considered when establishing a computer security program or updating an existing program. AUTHOR: Leuser, K.G. TITLE OF ARTICLE: Security Programs: Only as Good as We Make Them NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: 100 NUMBER OF PERIODICAL: 2 ISSUE DATE: August 1984 PAGE NUMBER(S): 91-92 CATEGORY: Training & Awareness DESCRIPTION: Discusses how an effective security program helps to foil or discourage people with dishonest intentions. Looks at the office administrator's domain to identify areas of potential vulnerability. AUTHOR: Weber, A. TITLE OF ARTICLE: Effective Security Programs Start with Awareness NAME OF PERIODICAL: Data Management VOLUME OF PERIODICAL: 23 NUMBER OF PERIODICAL: 11 ISSUE DATE: November 1985 PAGE NUMBER(S): 34-35 CATEGORY: Training & Awareness DESCRIPTION: Educating end users is the key to helping prevent crime and computer abuse in an organization. AUTHORS NOT SPECIFIED ABUSE/MISUSE/CRIME AUTHOR: Not Specified TITLE OF ARTICLE: Computer "Hacking" is No Longer Just a Lark NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: 102 NUMBER OF PERIODICAL: 3 ISSUE DATE: September 1985 PAGE NUMBER(S): 90-95 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: Computer hackers will use computers to obtain information and resell it, use it for blackmail, extortion, and espionage. This article discusses techniques for preventing hackers from getting on a system, and monitoring them if they are discovered. AUTHOR: Not Specified TITLE OF ARTICLE: Computer Security: The Menace is Human Error NAME OF PERIODICAL: Office VOLUME OF PERIODICAL: 99 NUMBER OF PERIODICAL: 3 ISSUE DATE: March 1984 PAGE NUMBER(S): 119-120 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article stresses that managers should understand that data security is a people problem and not a computer problem. People are the ones that either accidentally or intentionally misuse a computer system. AUTHOR: Not Specified TITLE OF ARTICLE: Internal Security NAME OF PERIODICAL: PC Week VOLUME OF PERIODICAL: 2 NUMBER OF PERIODICAL: 18 ISSUE DATE: May 1985 PAGE NUMBER(S): 89-91, 106-107 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: Experts feel that local computer access is more prone to intrusion than long-distance access. This article discusses how insiders in a company are the ones most likely to abuse a computer system. AUTHOR: Not Specified TITLE OF ARTICLE: Reporting Computer Crime NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 6 ISSUE DATE: July/August 1984 PAGE NUMBER(S): 20-21 CATEGORY: Abuse/Misuse/Crime DESCRIPTION: This article presents a suggested format for a final report to use in documenting actions surrounding a computer crime. ACCESS CONTROL AUTHOR: Not Specified TITLE OF ARTICLE: Communications and Systems Security NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 3 ISSUE DATE: 1985 Buyer's Directory PAGE NUMBER(S): 11-13 CATEGORY: Access Control DESCRIPTION: This article discusses a wide variety of communications and system security protection methods. Includes encryption, fiber optics, key management, optical links, electrical emanations, and dial-up access protection devices. AUTHOR: Not Specified TITLE OF ARTICLE: Computer Communications Security Lexicon NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 11 NUMBER OF PERIODICAL: 2 ISSUE DATE: Spring 1987 PAGE NUMBER(S): 22-23 CATEGORY: Access Control DESCRIPTION: This article is an update containing some new added security definitions of terms and phrases. AUTHOR: Not Specified TITLE OF ARTICLE: Controlling Access To Your Data NAME OF PERIODICAL: Personal Computing VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 9 ISSUE DATE: September 1985 PAGE NUMBER(S): 60-72 CATEGORY: Access Control DESCRIPTION: Explains measures that can be taken to protect what's in a computer. Focuses not only on vandals, but also on people who accidentally harm the computer. AUTHOR: Not Specified TITLE OF ARTICLE: Dial-Up Access Security Products NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 2 ISSUE DATE: November/December 1984 PAGE NUMBER(S): 21-24 CATEGORY: Access Control DESCRIPTION: This article presents some new dial-up access security products and their major features. AUTHOR: Not Specified TITLE OF ARTICLE: Enhancements Out For Barrier Security Devices NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 18 NUMBER OF PERIODICAL: 35 ISSUE DATE: August 1984 PAGE NUMBER(S): 51 CATEGORY: Access Control DESCRIPTION: This article discusses the password protection device designed by International Anasazi, Inc. that will limit access on dial-up lines. AUTHOR: Not Specified TITLE OF ARTICLE: Firesign Unwraps Security Feature NAME OF PERIODICAL: MIS Week VOLUME OF PERIODICAL: 5 NUMBER OF PERIODICAL: 23 ISSUE DATE: June 1984 PAGE NUMBER(S): 24 CATEGORY: Access Control DESCRIPTION: This article discusses Firesign Computer Company's product that provides for network security by its password system. AUTHOR: Not Specified TITLE OF ARTICLE: Security Computer Outsmarts Colorado Bandits NAME OF PERIODICAL: Data Management VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 7 ISSUE DATE: July 1981 PAGE NUMBER(S): 17-18 CATEGORY: Access Control DESCRIPTION: This article looks at the effectiveness of a security system that controls access to several high-rise buildings in Colorado. AUTHOR: Not Specified TITLE OF ARTICLE: Security Lock Ready for PCs NAME OF PERIODICAL: MIS Week VOLUME OF PERIODICAL: 6 NUMBER OF PERIODICAL: 26 ISSUE DATE: July 1985 PAGE NUMBER(S): 30 CATEGORY: Access Control DESCRIPTION: The hard disk security product "Knight Data Security Manager" is discussed. This product allows password protection in a PC. CONTINGENCY PLANNING AUTHOR: Not Specified TITLE OF ARTICLE: Automated Contingency Planning NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April 1984 PAGE NUMBER(S): 22 CATEGORY: Contingency Planning DESCRIPTION: This article presents a special purpose software package CHI/COR that deals with the job of documenting the resources needed to implement a disaster recovery plan. AUTHOR: Not Specified TITLE OF ARTICLE: Contingency Planning and the Law NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April 1984 PAGE NUMBER(S): 17-18 CATEGORY: Contingency Planning DESCRIPTION: This article reviews the Foreign Corrupt Practices Act and its requirement for record keeping and internal controls. Other potential legal liabilities are also reviewed. ENVIRONMENTAL SECURITY AUTHOR: Not Specified TITLE OF ARTICLE: Computer Power and Environmental Controls NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 3 ISSUE DATE: 1985 Buyer's Directory PAGE NUMBER(S): 13 CATEGORY: Environmental Security DESCRIPTION: This article discusses common power anomalies and equipment available to overcome them. GENERAL SECURITY AUTHOR: Not Specified TITLE OF ARTICLE: Computer Back-up Facilities NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April 1984 PAGE NUMBER(S): 19-22 CATEGORY: General Security DESCRIPTION: This article discusses the options of back-up sites including cold sites, hot sites, or empty shell, or fully equipped recovery sites. Also refers to the extent of equipment, space, and services provided by these back-up facilities. AUTHOR: Not Specified TITLE OF ARTICLE: Computer Security: Issues and Answers NAME OF PERIODICAL: Datamation VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: September 15, 1984 PAGE NUMBER(S): 16 Pages CATEGORY: General Security DESCRIPTION: This 16-page section sponsored by the Computer Security Institute contains several articles that cover a variety of computer security issues. AUTHOR: Not Specified TITLE OF ARTICLE: Computer Security: Issues and Answers NAME OF PERIODICAL: Datamation VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: September 15 1985 PAGE NUMBER(S): 24 Pages CATEGORY: General Security DESCRIPTION: This advertisement section contains eight articles that discuss a variety of computer security issues. The authors include FBI Director William Webster and Department of Defense Computer Security Center Director Robert Brotzman. AUTHOR: Not Specified TITLE OF ARTICLE: Making The Case For Computer Security Pure and Simple NAME OF PERIODICAL: Datamation VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: September 1983 PAGE NUMBER(S): CATEGORY: General Security DESCRIPTION: This section of Datamation is sponsored by the Computer Security Institute and covers a broad range of computer security issues in several different articles. AUTHOR: Not Specified TITLE OF ARTICLE: Personal Computers vs. Data Data Security: the Two Need Not Be Incompatible NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 12 NUMBER OF PERIODICAL: 1 ISSUE DATE: Winter 1988 PAGE NUMBER(S): 24-26 CATEGORY: General Security DESCRIPTION: This article discusses the threat of data loss either intentional or unintentional. It examines the significant risks and the data security policies to lower these risks. AUTHOR: Not Specified TITLE OF ARTICLE: Protecting Information and Interest NAME OF PERIODICAL: Computer Management VOLUME OF PERIODICAL: NUMBER OF PERIODICAL: ISSUE DATE: October 1981 PAGE NUMBER(S): 33-34, 36 CATEGORY: General Security DESCRIPTION: Suppliers, consultants, and services related to computer security are listed in this directory. AUTHOR: Not Specified TITLE OF ARTICLE: Simple Security Precautions Ensure Information Safety NAME OF PERIODICAL: Computerworld VOLUME OF PERIODICAL: 19 NUMBER OF PERIODICAL: 17 ISSUE DATE: April 1985 PAGE NUMBER(S): SR-38 CATEGORY: General Security DESCRIPTION: This article applies many of the security precautions for mainframes to the microcomputer. MICROCOMPUTER SECURITY AUTHOR: Not Specified TITLE OF ARTICLE: Memo: Disaster Plan For Microcomputer Users NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April 1984 PAGE NUMBER(S): 27-29 CATEGORY: Microcomputer Security DESCRIPTION: This article is in the form a memo containing a microcomputer disaster recovery checklist. It address issues that should be taken in contingency plans. PHYSICAL SECURITY AND HARDWARE AUTHOR: Not Specified TITLE OF ARTICLE: Media Safes: Countering the Threats of Fire NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 6 ISSUE DATE: July/August 1985 PAGE NUMBER(S): 18-20 CATEGORY: Physical Security & Hardware DESCRIPTION: This article is a review of critical basic information on how to select fire resistant media safes. RISK MANAGEMENT AUTHOR: Not Specified TITLE OF ARTICLE: Protecting The World's Largest Computer User NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April 1984 PAGE NUMBER(S): 25-26 CATEGORY: Risk Management DESCRIPTION: This article discusses a new high security off-site storage facility opening in Beltsville, Maryland. It also address concern with the lack of proper security storage today. SECURITY MANAGEMENT AUTHOR: Not Specified TITLE OF ARTICLE: Computer Security Awareness: Organizations and Senior Management Concerns NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 5 ISSUE DATE: May/June 1984 PAGE NUMBER(S): 12-13 CATEGORY: Security Management DESCRIPTION: This article gives the result of a survey of general security and computer security personnel, EDP auditors, and internal auditors to determine the computer security awareness of their company and senior management. AUTHOR: Not Specified TITLE OF ARTICLE: Records Storage and Management NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 4 ISSUE DATE: March/April 1984 PAGE NUMBER(S): 23-25 CATEGORY: Security Management DESCRIPTION: This article addresses the questions which records should be stored off-site, and how can an off-site facility be evaluated? It also provides an overview of areas to consider. SOFTWARE AND OPERATING SYSTEM SECURITY AUTHOR: Not Specified TITLE OF ARTICLE: Computer Security Software NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 1 ISSUE DATE: September/October 1984 PAGE NUMBER(S): 19-24 CATEGORY: Software & Operating System Security DESCRIPTION: This article provides information for using access control software to protect the terminals, the data and the system itself from unauthorized use. AUTHOR: Not Specified TITLE OF ARTICLE: Computer Security Software NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 9 NUMBER OF PERIODICAL: 3 ISSUE DATE: 1985 Buyer's Directory PAGE NUMBER(S): 17-18 CATEGORY: Software and Operating System Security DESCRIPTION: This article addresses a wide variety of computer security software programs and their different uses. AUTHOR: Not Specified TITLE OF ARTICLE: Protecting Software With Escrow Services NAME OF PERIODICAL: Data Processing & Communications Security VOLUME OF PERIODICAL: 8 NUMBER OF PERIODICAL: 5 ISSUE DATE: May/June 1984 PAGE NUMBER(S): 22-24 CATEGORY: Software & Operating System Security DESCRIPTION: This article addresses some of the problems and answers for protecting software that concerns major management today.