Evaluation of computer and network security systems

ACM '84 Pub Date : 1900-01-01 DOI:10.1145/800171.809644
S. Thompson
{"title":"Evaluation of computer and network security systems","authors":"S. Thompson","doi":"10.1145/800171.809644","DOIUrl":null,"url":null,"abstract":"This topic deals with the net difference in the security posture resulting from the proliferation of the business world by microcomputers and computer networks.\n The following are the premises that will be discussed:\n A. Large 4th generation computer systems, while not fully secured, were designed with some level of controls, auditibility and recovery;\n B. Microcomputer design and operational characteristics have created a multitude of new security problems while resolving a variety of old security problems;\n C. Networks, while compounding some security problems, also mitigated many microcomputers related data base system controls and auditing problems.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"166 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '84","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800171.809644","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This topic deals with the net difference in the security posture resulting from the proliferation of the business world by microcomputers and computer networks. The following are the premises that will be discussed: A. Large 4th generation computer systems, while not fully secured, were designed with some level of controls, auditibility and recovery; B. Microcomputer design and operational characteristics have created a multitude of new security problems while resolving a variety of old security problems; C. Networks, while compounding some security problems, also mitigated many microcomputers related data base system controls and auditing problems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
评估计算机和网络安全系统
本主题讨论由于微型计算机和计算机网络在商业世界的扩散而导致的安全状况的净差异。以下是将要讨论的前提:A.大型第四代计算机系统虽然没有完全安全,但在设计时具有一定程度的控制、可审计性和可恢复性;B.微机的设计和运行特点在解决各种旧的安全问题的同时,产生了许多新的安全问题;网络虽然使一些安全问题复杂化,但也减轻了许多与微型计算机有关的数据库系统控制和审计问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Beyond the data processing horizon The IEEE Software Engineering standards process PVS - design for a practical verification system A national perspective on computer security AFIPS secondary education curriculum in information technology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1