How to Obtain
Documents |
|
NCJ Number:
|
NCJ 100244
|
Title:
|
Protecting Personal Computers - A Checklist Approach
|
Journal:
|
Computer Security Journal Volume:3 Issue:2 Dated:(Winter 1985) Pages:13-24
|
Author(s):
|
P N Prause ; G I Isaacson
|
Publication Date:
|
1985 |
Pages:
|
12 |
Type:
|
Measurement/evaluation devices |
Origin:
|
United States |
Language:
|
English |
Annotation:
|
This computer security checklist provides guidelines for protecting personal computer information and processing resources. |
Abstract:
|
The checklist is divided into subgroups, each preceded by a summary of the key problems found in that area. The risks and attendant control measures are identified as ''critical;' other concerns of lesser importance and their controls are identified as ''recommended.' Areas covered include management issues related to policies, strategies, and accountability; personnel considerations; administrative controls; the physical environment; physical access and theft prevention; moving and transferring equipment; and personal computer maintenance and repair. Additional areas are media control, backups and contingency planning, data access controls, the personal computer-mainframe connection, security in local area networks, encryption, software and documentation control, liability concerns, and auditing. (Author abstract modified) |
Main Term(s):
|
Computer privacy and security |
Index Term(s):
|
Computer related crime ; Computer crime prevention measures |
|
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/Publications/abstract.aspx?ID=100244
|
* A link to the full-text document is provided whenever possible. For documents
not available online, a link to the publisher's web site is provided.
|