Data security

ACM-SE 17 Pub Date : 1979-04-09 DOI:10.1145/503506.503543
D. Hanson
{"title":"Data security","authors":"D. Hanson","doi":"10.1145/503506.503543","DOIUrl":null,"url":null,"abstract":"The need for computer security has grown every year since the creation of computer systems, but yet with such a high demand, there are many systems that are, by no means, adecuetly protected.This paper will discuss the three classes of vulnerabilities of security. The three classes are: those that threaten the physical integrity of the computer installation and its data, those that threaten the loss or compromise of the data from outside the computersite, and those that threaten loss or compromise of data from inside the computer site.The chief physical risk to a computer site is fire, acts of sabotage, industrial accidents, natural disasters, and mechanical or electrial malfunction of the computer system. Outside threats are those people who do not work for a particular firm, but yet wish to gain information about it that is not readily accessible to them. Inside threats come from employees who wish to compromise the computer system weither for gain, accident, or past time. Each one of these topics will be dealt withThe next part of the paper deals with the subject of setting up a security program. The first step in this subject is the study to access the probability of an event occuring, and determining it as either fatal to the business, very serious, moderately serious, relatively unimportant, or seriousness unknown. Some of the security techniques of checks and tests on the system are then discused.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"401 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1979-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"160","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM-SE 17","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/503506.503543","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 160

Abstract

The need for computer security has grown every year since the creation of computer systems, but yet with such a high demand, there are many systems that are, by no means, adecuetly protected.This paper will discuss the three classes of vulnerabilities of security. The three classes are: those that threaten the physical integrity of the computer installation and its data, those that threaten the loss or compromise of the data from outside the computersite, and those that threaten loss or compromise of data from inside the computer site.The chief physical risk to a computer site is fire, acts of sabotage, industrial accidents, natural disasters, and mechanical or electrial malfunction of the computer system. Outside threats are those people who do not work for a particular firm, but yet wish to gain information about it that is not readily accessible to them. Inside threats come from employees who wish to compromise the computer system weither for gain, accident, or past time. Each one of these topics will be dealt withThe next part of the paper deals with the subject of setting up a security program. The first step in this subject is the study to access the probability of an event occuring, and determining it as either fatal to the business, very serious, moderately serious, relatively unimportant, or seriousness unknown. Some of the security techniques of checks and tests on the system are then discused.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
数据安全
自从计算机系统诞生以来,对计算机安全的需求每年都在增长,但是由于需求如此之高,许多系统根本没有得到适当的保护。本文将讨论三类安全漏洞。这三类是:威胁计算机装置及其数据的物理完整性的威胁,威胁计算机站点外部数据丢失或泄露的威胁,以及威胁计算机站点内部数据丢失或泄露的威胁。计算机站点的主要物理风险是火灾、破坏行为、工业事故、自然灾害以及计算机系统的机械或电气故障。外部威胁指的是那些不为某家公司工作,但却希望获得自己无法轻易获得的信息的人。内部威胁来自那些想要破坏计算机系统的员工,要么是为了利益,要么是为了事故,要么是为了打发时间。本文的下一部分将讨论建立安全程序的主题。本主题的第一步是研究事件发生的概率,并确定其对业务的致命程度,非常严重,中等严重,相对不重要或严重程度未知。然后讨论了对系统进行检查和测试的一些安全技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An assessment of organizational practices in data processing environments Indirect addressing techniques in the design and implementation of an on-line file access program Toward a multiple copy file assignment model for files in a computer system Exact tests of significance in 2xM contingency tables Some properties of relational expressions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1