About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Bibliography of Computer Security Articles


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

BIBLIOGRAPHY OF COMPUTER SECURITY ARTICLES
1983 THROUGH 1988

(Note: A bibliograpghy is now being developed to encompass
1989.)

AUTHORS SPECIFIED

ABUSE/MISUSE/CRIME

AUTHOR: Associated Press

TITLE OF ARTICLE: Jury Selection In 1st "Virus"
Trial Begins

NAME OF PERIODICAL: Washington Post

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL: 277
ISSUE DATE: September 7, 1988
PAGE NUMBER(S): C1
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article is about a programmer
accused of using a computer "virus" to sabotage
thousands of records at his former work place.

AUTHOR: Atkinson, L.V.

TITLE OF ARTICLE: Fraud: Input Data Most
Vulnerable

NAME OF PERIODICAL: Computerworld UK

VOLUME OF PERIODICAL: 2
NUMBER OF PERIODICAL: 21
ISSUE DATE: September 2, 1981
PAGE NUMBER(S): 10
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: Article discusses a survey which
found that the major danger to computers was the
alteration of input data.

AUTHOR: Baker, R.H.

TITLE OF ARTICLE: Lining Up Computer Crooks

NAME OF PERIODICAL: Micro Communications

VOLUME OF PERIODICAL: 2
NUMBER OF PERIODICAL: 5
ISSUE DATE: May 1985
PAGE NUMBER(S): 18-22
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article looks at crime patterns
of microcomputer users breaking into mainframes.
Ways in which these patterns can be learned and then
stopped is discussed.

AUTHOR: Bequai, A.

TITLE OF ARTICLE: What to do About Crime in the
Electronic Office

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL: 101
NUMBER OF PERIODICAL: 1
ISSUE DATE: January 1985
PAGE NUMBER(S): 101-104
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article discusses the important
role that auditing computer systems plays in
preventing crimes and abuse.

AUTHOR: Betts, M.

TITLE OF ARTICLE: Government's Computers
"Highly Vulnerable" to Abuse

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 18
NUMBER OF PERIODICAL: 40
ISSUE DATE: October 1984
PAGE NUMBER(S): 4
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: Discusses how highly vulnerable the
federal government's computers are to abuse, and a
congressman who is seeking to change that
vulnerability.

AUTHOR: Blakeney, S.

TITLE OF ARTICLE: Computer Crime: A Worldwide
Concern

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 17, 18
NUMBER OF PERIODICAL: 52, 1
ISSUE DATE: December 26, 1983, January 1984
PAGE NUMBER(S): 57-60
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article looks at computer crime
as a worldwide problem. The most common types of
computer crimes are given along with the estimated
losses in various countries throughout the world.

AUTHOR: Bologna, Jack

TITLE OF ARTICLE: Computer Related Crime: The Who,
What, Where, When, Why and How

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 10
NUMBER OF PERIODICAL: 1
ISSUE DATE: Winter 1986
PAGE NUMBER(S): 19-23
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article looks at computer related
crime from the perspectives of the individual
criminal, environmental factors, organization
cultures, incidence rate, and security
countermeasures.

AUTHOR: Bramer, W.L.

TITLE OF ARTICLE: Computer and Data Security is
Battle Cry to the '80s

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL: 103
NUMBER OF PERIODICAL: 3
ISSUE DATE: March 1986
PAGE NUMBER(S): 78-82
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article discusses the number of
organizations that are looking at their security
procedures and programs to deter computer abuse. The
three main causes of security problems are
described.

AUTHOR: Carey, Cameron

TITLE OF ARTICLE: Data Access Control: Help or
Hindrance

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 11
NUMBER OF PERIODICAL: 4
ISSUE DATE: Fall 1987
PAGE NUMBER(S): 18-20
CATEGORY: Access Control
DESCRIPTION: This article discusses limiting access
to data and how to make access control protection
more of a help than a hindrance by developing a set
of priorities about various classes of data.

AUTHOR: Edwards, M.

TITLE OF ARTICLE: The Sting in a Micro's Tail

NAME OF PERIODICAL: Practical Computing

VOLUME OF PERIODICAL: 6
NUMBER OF PERIODICAL: 12
ISSUE DATE: December 1983
PAGE NUMBER(S): 108-109
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: How criminals exploit information
technology is described in this article along with
ways to stop them.

AUTHOR: Elmer-Dewitt, Phillip

TITLE OF ARTICLE: Invasion of the Data Snatchers!

NAME OF PERIODICAL: Time Magazine

VOLUME OF PERIODICAL: 123
NUMBER OF PERIODICAL: 13
ISSUE DATE: September 26, 1988
PAGE NUMBER(S): 62-67
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: Discusses the current threat to
computer systems posed by computer viruses. Computer
viruses are defined and several examples of viruses
are given.

AUTHOR: Johnson, B.

TITLE OF ARTICLE: Criminal Minds Keep Pace with
Technology. Stop, Thief!

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 15, 16
NUMBER OF PERIODICAL: 52, 1
ISSUE DATE: December 28, 1981, January 4, 1982
PAGE NUMBER(S):
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article looks at some of the
common problems that the DP industry faces today
including computer security, asset protection, and
computer fraud prevention.

AUTHOR: Kluepfel, Henry M.

TITLE OF ARTICLE: Computer Security for the
Abuser Friendly Environment

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 2
ISSUE DATE: November/December 1984
PAGE NUMBER(S): 16-20
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article discusses the underlying
lack of adequate controls in computer systems and
their relation to computer abuse and crime.

AUTHOR: Kull, D.

TITLE OF ARTICLE: How to Make Even E.F. Hutton
Listen

NAME OF PERIODICAL: Computer Decisions

VOLUME OF PERIODICAL: 17
NUMBER OF PERIODICAL: 18
ISSUE DATE: September 1985
PAGE NUMBER(S): 42-50
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: The most effective way for an
organization to prevent breaches in a computer
system is to plug the holes that have already been
used to violate the system and identify the
intruders.

AUTHOR: Lasden, Martin

TITLE OF ARTICLE: Computer Crime

NAME OF PERIODICAL: Computer Decisions

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: June 1981
PAGE NUMBER(S): 104-106, 108 112, 116, 118, 120,
122, 124
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article discusses actual computer
crimes that have taken place and the factors that
escalate the risk of an organization from these
types of crime.

AUTHOR: Lucas, D.

TITLE OF ARTICLE: The Invisible Enemy

NAME OF PERIODICAL: Business Computing and
Communication
VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: February 1985
PAGE NUMBER(S): 18-20
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article describes how home
computer users are breaking into some of Britain's
mainframe computers. Various procedures that can
protect against intrusion are also discussed by the
author.

AUTHOR: McKibbin, W.L.

TITLE OF ARTICLE: Who Gets The Blame For Computer
Crime

NAME OF PERIODICAL: Infosystems

VOLUME OF PERIODICAL: 30
NUMBER OF PERIODICAL: 7
ISSUE DATE: July 1983
PAGE NUMBER(S): 34-36
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: MIS managers are ultimately responsible
for the security of their computers. Since they are
responsible they should make sure upper management
is aware of the vulnerabilities of their computers.

AUTHOR: Mylott, T.R.

TITLE OF ARTICLE: Computer Security and the
Threats from Within

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL: 101
NUMBER OF PERIODICAL: 3
ISSUE DATE: March 1985
PAGE NUMBER(S): 45-46, 190
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article explains that the greatest
computer-related danger to a company may be from
internal threats by employees.

AUTHOR: White, L.

TITLE OF ARTICLE: Data Security - You Can't
Work Without It

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 11A
ISSUE DATE: March 1985
PAGE NUMBER(S): 27-30
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: The problem of the disgruntled employee
or ex-employee who sabotages a computer system is
seen as more of a threat than an outside hacker.

AUTHOR: Zalud, Bill

TITLE OF ARTICLE: Security and DP Cooperate to
Attack Computer Crime

NAME OF PERIODICAL: Security

VOLUME OF PERIODICAL: 24
NUMBER OF PERIODICAL: 10
ISSUE DATE: October 1987
PAGE NUMBER(S): 52-56, & 58
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article stresses teamwork as
computer crime becomes a company fact of life by
effectively cuts across a number of functional
areas.

ACCESS CONTROL

AUTHOR: Avarne, Simon

TITLE OF ARTICLE: How to Find Out a Password

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 12
NUMBER OF PERIODICAL: 2
ISSUE DATE: Spring 1988
PAGE NUMBER(S): 16-17
CATEGORY: Access Control
DESCRIPTION: This article gives examples of how to
discover someones password and discusses weaknesses
of traditional passwords.

AUTHOR: Betts, M.

TITLE OF ARTICLE: NBS Releases Standards For
Managing Password Security

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 28
ISSUE DATE: July 1985
PAGE NUMBER(S): 19
CATEGORY: Access Control

DESCRIPTION: This article talks about how the
National Bureau of Standards has completed a two-
part publication dealing with password systems.

AUTHOR: Bowmen, Terry

TITLE OF ARTICLE: Undercarpet Fiber Optics

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 11
NUMBER OF PERIODICAL: 2
ISSUE DATE: Spring 1987
PAGE NUMBER(S): 23-26
CATEGORY: Access Control
DESCRIPTION: This article discusses how fiber optics
offer better security than copper cable undercarpet.
It also includes how to plan an undercarpet system.

AUTHOR: Clyde, Allen R.

TITLE OF ARTICLE: Insider Threat on Automated
Information Systems

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 11
NUMBER OF PERIODICAL: 4
ISSUE DATE: Fall 1987
PAGE NUMBER(S): 11-14
CATEGORY: Access Control
DESCRIPTION: This articles discusses activities to
detect sources of abuse that are not widely
implemented.


AUTHOR: Davidson, Thomas L. and
White, Clinton E. Jr.
TITLE OF ARTICLE: How to Improve Network Security

NAME OF PERIODICAL: Infosystems

VOLUME OF PERIODICAL: 30
NUMBER OF PERIODICAL: 6
ISSUE DATE: June 1983
PAGE NUMBER(S): 110-112
CATEGORY: Access Control

DESCRIPTION: This article discusses the need to
protect network systems using software locks,
authorization schemes, logs, and data encryption.


AUTHOR: Diamond, F.H.

TITLE OF ARTICLE: Computer Network Security: The
Need Was Never Greater

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL: 102
NUMBER OF PERIODICAL: 2
ISSUE DATE: August 1985
PAGE NUMBER(S): 94-99
CATEGORY: Access Control

DESCRIPTION: This article discusses the advantages
of using the callback approach in computer networks
to prevent hackers from getting onto a system.


AUTHOR: Fisher, M.J.

TITLE OF ARTICLE: New Security Device "Fingers"
Culprit

NAME OF PERIODICAL: MIS Week

VOLUME OF PERIODICAL: 6
NUMBER OF PERIODICAL: 35
ISSUE DATE: September 1985
PAGE NUMBER(S): 12
CATEGORY: Access Control

DESCRIPTION: This article describes a new product
that uses a fingerprint device to verify a user's
identity and then allow access on the computer
system.


AUTHOR: Horgan, J.

TITLE OF ARTICLE: Thwarting The Information Thiefs

NAME OF PERIODICAL: IEEE Spectrum

VOLUME OF PERIODICAL: 22
NUMBER OF PERIODICAL: 7
ISSUE DATE: July 1985
PAGE NUMBER(S): 30-41
CATEGORY: Access Control

DESCRIPTION: Many organizations are protecting
their communication output from electronic
interception by trying to detect and foil the
surveillance using a variety of methods.

AUTHOR: Jackson, Carl B.

TITLE OF ARTICLE: Passwords: Comments from the
Information Systems Security
Association
NAME OF PERIODICAL: Security

VOLUME OF PERIODICAL: 24
NUMBER OF PERIODICAL: 7
ISSUE DATE: July 1987
PAGE NUMBER(S): 105
CATEGORY: Access Control
DESCRIPTION: Discusses relevant security issues and
how to bring an appropriate degree of LAN
information security to your organization.


AUTHOR: Kontur, J.S. and Letham, L.

TITLE OF ARTICLE: Locking Up System Security

NAME OF PERIODICAL: Electronic Week

VOLUME OF PERIODICAL: 58
NUMBER OF PERIODICAL: 7
ISSUE DATE: February 18, 1985
PAGE NUMBER(S): 68-72
CATEGORY: Access Control

DESCRIPTION: This article describes a system that
cannot be broken into by unauthorized users. It uses
a random-number generator and encryption logic.


AUTHOR: Korzeniowski, P.

TITLE OF ARTICLE: Security Dynamics Releases Two-
Part Security System

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 42
ISSUE DATE: October 1985
PAGE NUMBER(S): 19, 23
CATEGORY: Access Control

DESCRIPTION: This article discusses a product
Security Dynamics has designed that is an
inexpensive security protection device which keeps
hackers out of systems.

AUTHOR: McCarthy, Charles J.

TITLE OF ARTICLE: Passwords

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 10
NUMBER OF PERIODICAL: 4
ISSUE DATE: Fall 1986
PAGE NUMBER(S): 13-14
CATEGORY: Access Control
DESCRIPTION: This article discusses the two primary
password configurations passwords defined by user,
and passwords assigned to a user. It shows the
differences between these two from a security view.

AUTHOR: Meason, Robert

TITLE OF ARTICLE: System Security at the Terminal

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 10
NUMBER OF PERIODICAL: 4
ISSUE DATE: Fall 1986
PAGE NUMBER(S): 16-17
CATEGORY: Access Control
DESCRIPTION: This article discusses considerations
of MIS management protection of the processor from
access by unauthorized users.

AUTHOR: Muzerall, Joseph V. and Carty, Thomas J.

TITLE OF ARTICLE: COMSEC and Its Need for Key
Management

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 11
NUMBER OF PERIODICAL: 2
ISSUE DATE: Spring 1987
PAGE NUMBER(S): 11-14
CATEGORY: Access Control
DESCRIPTION: This article explains the establishment
of a standard set of protection mechanisms for both
the classified and private user communities.

AUTHOR: Schiller, Michael

TITLE OF ARTICLE: Security at the Touch of a
Finger

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 6
ISSUE DATE: July/August 1985
PAGE NUMBER(S): 15-17
CATEGORY: Access Control
DESCRIPTION: This article discusses using biometric
security systems for high-tech solutions to access
control problems.

AUTHOR: Schmonsees, Robert J.

TITLE OF ARTICLE: Identification and Authentication:
The Security Challenge of the 80's

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April, 1985
PAGE NUMBER(S): 22-23
CATEGORY: Access Control
DESCRIPTION: This article discusses the computer
security issues of identification and authentication
showing the common problems and offering some
suggestions for improving by random passcode.

AUTHOR: Stieglitz, M.

TITLE OF ARTICLE: Security For Shared Resources

NAME OF PERIODICAL: Micro Communications

VOLUME OF PERIODICAL: 2
NUMBER OF PERIODICAL: 6
ISSUE DATE: June 1985
PAGE NUMBER(S): 19-26
CATEGORY: Access Control

DESCRIPTION: This article discusses data security
products and procedures for network use. Includes
description of encryption techniques that are now
popular.


AUTHOR: Wood, Charles Cresson

TITLE OF ARTICLE: A New Approach to Computer User
Authentication

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 10
NUMBER OF PERIODICAL: 4
ISSUE DATE: Fall 1986
PAGE NUMBER(S): 21-26
CATEGORY: Access Control
DESCRIPTION: This article gives a new approach to
authentication called dial-guard. It addresses the
two problems of password/users IDs not providing
sufficient security and identifying the location of
dial-up users.


AUTHOR: Wood, Charles Cresson

TITLE OF ARTICLE: Information Security with
One-Way Functions

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 5
ISSUE DATE: May/June 1985
PAGE NUMBER(S): 14-16
CATEGORY: Access Control
DESCRIPTION: This article explains how one-way
functions can be used to safeguard information that
is too sensitive to be protected via encryption.

AUDIT AND EVALUATION

AUTHOR: Berman, A.

TITLE OF ARTICLE: Evaluating On-Line Computer
Security

NAME OF PERIODICAL: Data Communications

VOLUME OF PERIODICAL: 12
NUMBER OF PERIODICAL: 7
ISSUE DATE: July 1983
PAGE NUMBER(S): 145-152
CATEGORY: Audit and Evaluation

DESCRIPTION: The security problems that have arisen
because of on-line processing are discussed in this
article. Covered are the two ways to obtain a secure
on-line system.

AUTHOR: Betts, M.

TITLE OF ARTICLE: U.S. Agency Faces Probes, Boosts
Security After Audit

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 24
ISSUE DATE: June 1985
PAGE NUMBER(S): 8
CATEGORY: Audit and Evaluation

DESCRIPTION: This article discusses an audit report
issued by the inspector general of the U.S.
Department of the Interior in March 1985 which
revealed inadequate controls over passwords, faulty
operating procedures, and lack of audit trails by
the Denver Service Center.

AUTHOR: Bologna, Jack

TITLE OF ARTICLE: Forensic Accounting

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 6
ISSUE DATE: July/August 1984
PAGE NUMBER(S): 16-20
CATEGORY: Audit and Evaluation
DESCRIPTION: This article identifies the skills and
competency of a forensic accountant.

AUTHOR: Flach, Joseph P.

TITLE OF ARTICLE: Increasing Programming Efficiency
While Preventing the "F" Word

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 11
NUMBER OF PERIODICAL: 4
ISSUE DATE: Fall 1987
PAGE NUMBER(S): 15-17
CATEGORY: Audit and Evaluation
DESCRIPTION: This article gives examples of ways
to identify fraudulent code in a production program.

AUTHOR: Gaydasch, Alexander

TITLE OF ARTICLE: Postimplementation Audits -
A Quick, Easy Approach

NAME OF PERIODICAL: Data Management

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: February 1983
PAGE NUMBER(S): 54, 55, 69
CATEGORY: Audit and Evaluation

DESCRIPTION: This article describes post-
implementation audits and how they help to determine
whether a computer system has met its original
criteria.


CONTINGENCY PLANNING

AUTHOR: Cabell, D.

TITLE OF ARTICLE: Network Backups

NAME OF PERIODICAL: Micro Communications

VOLUME OF PERIODICAL: 2
NUMBER OF PERIODICAL: 6
ISSUE DATE: June 1985
PAGE NUMBER(S): 14-18
CATEGORY: Contingency Planning

DESCRIPTION: This article describes how the only way
to protect a LAN, micro, mini, or mainframe from a
complete system crash is adequate backup.

AUTHOR: Ciura, J.M.

TITLE OF ARTICLE: Vital Records Protection:
Identifying Essential
Information
NAME OF PERIODICAL: Information Management

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 2
ISSUE DATE: February 1985
PAGE NUMBER(S): 11
CATEGORY: Contingency Planning

DESCRIPTION: This article suggest that the best way
to resume business activity after an emergency or
disaster is to have a vital records protection
program.

AUTHOR: Clauss, Karl H.

TITLE OF ARTICLE: How To Move A Data Center and
Avoid a Disaster

NAME OF PERIODICAL: Infosystems

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: December 1981
PAGE NUMBER(S): 46-48, 50
CATEGORY: Contingency Planning

DESCRIPTION: This article describes how ARCO Oil
and Gas Company moved their computer center to a new
location and the points a company should consider
when moving a data center.

AUTHOR: Dobberstein, M.

TITLE OF ARTICLE: To Have and Not to Have a
Disaster

NAME OF PERIODICAL: Computer Decisions

VOLUME OF PERIODICAL: 17
NUMBER OF PERIODICAL: 18
ISSUE DATE: September 1985
PAGE NUMBER(S): 102-126
CATEGORY: Contingency Planning

DESCRIPTION: This article deals with the importance
of actually testing contingency plans to see if they
work.

AUTHOR: Minoli, D.

TITLE OF ARTICLE: Backup Needs Merit Special
Attention

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 15
ISSUE DATE: April 1985
PAGE NUMBER(S): 91, 96
CATEGORY: Contingency Planning

DESCRIPTION: This article focuses on the merits of
backing up a data center to prevent a major disaster
from critically affecting a company.


AUTHOR: Pujals, J.M.

TITLE OF ARTICLE: What is a Contingency Plan?

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 12
NUMBER OF PERIODICAL: 1
ISSUE DATE: Winter 1988
PAGE NUMBER(S): 19-23
CATEGORY: Contingency Planning
DESCRIPTION: This article tells how to construct a
contingency plan and goes over the major mandatory
steps that have to be taken to end up with a
workable product.

AUTHOR: Raimondi, D.

TITLE OF ARTICLE: E.F. Hutton Underscores
Practicality in Backup Plan

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 15
ISSUE DATE: April 1985
PAGE NUMBER(S): 19
CATEGORY: Contingency Planning

DESCRIPTION: Describes how E.F. Hutton has built a
new computer room as part of its disaster recovery
plan.

AUTHOR: Rames, David

TITLE OF ARTICLE: Recovering From Disasters

NAME OF PERIODICAL: Computer Decisions

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: September 1981
PAGE NUMBER(S): 108-110, 112, 114, 120, 122, 124,
126-131, 188-189
CATEGORY: Contingency Planning

DESCRIPTION: Described in this article are criteria
for developing an emergency backup plan and examples
of emergency backup alternatives.


AUTHOR: Scoma, Louis

TITLE OF ARTICLE: How Secure Is Your Computer
Operation From A Disaster

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: August 1981
PAGE NUMBER(S): 96, 98
CATEGORY: Contingency Planning

DESCRIPTION: The failures of companies to protect
their computer centers is discussed along with the
need for recovery systems to serve as backup
security.


AUTHOR: Wolbrecht, J.E.

TITLE OF ARTICLE: Can Your Records Storage Center
Stand a Disaster

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL: 102
NUMBER OF PERIODICAL: 3
ISSUE DATE: September 1985
PAGE NUMBER(S): 112-113
CATEGORY: Contingency Planning

DESCRIPTION: A manager's responsibility to protect
a records storage center by recognizing vulnerable
areas and making them more secure is discussed.

DATABASE MANAGEMENT

AUTHOR: Pieper, Oscar R.

TITLE OF ARTICLE: Voice Authentication Wages A War
on Data Base Fraud

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 6
ISSUE DATE: July/August 1984
PAGE NUMBER(S): 12-13
CATEGORY: Data Base Security
DESCRIPTION: This article reviews the present state
of voice authentication technology and how it
applies to secure data bases from bogus intruders.

ENVIRONMENTAL SECURITY

AUTHOR: Lemke, Fred H.

TITLE OF ARTICLE: Blackouts and Computer Power
Protection

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 12
NUMBER OF PERIODICAL: 2
ISSUE DATE: Spring 1988
PAGE NUMBER(S): 19-23
CATEGORY: Environmental Security
DESCRIPTION: This article is a study that was taken
to see emerging patterns of blackouts that may be
useful in helping evaluate your level of blackout
vulnerability and then set up appropriate levels of
power protection for your electronic systems.


AUTHOR: Lemke, Fred H.

TITLE OF ARTICLE: Computer Power Protection

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April 1984
PAGE NUMBER(S): 31-33
CATEGORY: Environmental Security
DESCRIPTION: This article gives examples of how to
protect your facility against the harmful effects of
an electrical power outage.

AUTHOR: McGowan, Kevin J.

TITLE OF ARTICLE: Computer Power Protection

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 5
ISSUE DATE: May/June 1985
PAGE NUMBER(S): 21-25
CATEGORY: Environmental Security
DESCRIPTION: This article looks at understanding
AC power conditions in data processing site
preparation and its criticality for preventing
future computer downtime and disruptions.


GENERAL SECURITY

AUTHOR: Beitman, L.

TITLE OF ARTICLE: A Practical Guide To Small
Business Computer Security

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL: 96
NUMBER OF PERIODICAL: 2
ISSUE DATE: August 1982
PAGE NUMBER(S): 86, 90
CATEGORY: General Security

DESCRIPTION: This article gives advice on how to
obtain computer security in a small business
environment. A checklist is included that will help
to prevent accidental and intentional harm to a
system.

AUTHOR: Collins, J.A.

TITLE OF ARTICLE: Continuous Security Control
Clamps Down on Abuse

NAME OF PERIODICAL: Data Management

VOLUME OF PERIODICAL: 23
NUMBER OF PERIODICAL: 5
ISSUE DATE: May 1985
PAGE NUMBER(S): 56-59
CATEGORY: General Security

DESCRIPTION: The need for computer access is
discussed in this article that suggest that such
access should be a management, security-oriented
process. Computer security guidelines are also
given.

AUTHOR: Coontz, Constance

TITLE OF ARTICLE: Protection through Isolation

NAME OF PERIODICAL: Security Management

VOLUME OF PERIODICAL: 31
NUMBER OF PERIODICAL: 11
ISSUE DATE: November 1987
PAGE NUMBER(S): 53-55
CATEGORY: General Security
DESCRIPTION: This article discusses
compartmentalizing valuable data on dedicated PCs or
small computer systems to help protect it from
hackers and moles.

AUTHOR: Gazarek, Kenneth F.

TITLE OF ARTICLE: Cabinets for Electromagnetic
Interference/Radio-Frequency Interference and
TEMPEST Shielding
NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 6
ISSUE DATE: July/August 1985
PAGE NUMBER(S): 12-13
CATEGORY: General Security
DESCRIPTION: This article discusses the
electromagnetic interference and radio-frequency
interference control options, designing and building
metal cabinets that provide effective shielding.


AUTHOR: Lobel, J.

TITLE OF ARTICLE: Third Decade of Concern

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 16
NUMBER OF PERIODICAL: 6
ISSUE DATE: February 8, 1982
PAGE NUMBER(S): 1D/31-34 & 36
CATEGORY: General Security

DESCRIPTION: The author looks at some of the issues
associated with distributed data processing
including privacy, crime, and security.

AUTHOR: Miskiewicz, J.

TITLE OF ARTICLE: DP Security: A Delicate Balance

NAME OF PERIODICAL: Computer Decisions

VOLUME OF PERIODICAL: 17
NUMBER OF PERIODICAL: 8
ISSUE DATE: April 1985
PAGE NUMBER(S): 104-106
CATEGORY: General Security

DESCRIPTION: This article discusses the delicate
balance between protecting vital resources in a data
processing facility and enhancing productivity.

AUTHOR: Moulton, R.

TITLE OF ARTICLE: Prevention: Better Than
Prosecution

NAME OF PERIODICAL: Government Data Systems

VOLUME OF PERIODICAL: 10
NUMBER OF PERIODICAL: 6
ISSUE DATE: November/December 1981
PAGE NUMBER(S): 20 & 22-23
CATEGORY: General Security

DESCRIPTION: The focus of this paper is on
deterrence of computer abuse, whether it is
unintentional or intentional.

AUTHOR: Parker, D.B.

TITLE OF ARTICLE: The Many Faces of Data
Vulnerability

NAME OF PERIODICAL: IEEE Spectrum

VOLUME OF PERIODICAL: 21
NUMBER OF PERIODICAL: 5
ISSUE DATE: May 1984
PAGE NUMBER(S): 46-49
CATEGORY: General Security

DESCRIPTION: Discussed in this paper are both the
need for new computer security methods and the
attainable limits that can be reached by computer
security.


AUTHOR: Rosch, W.

TITLE OF ARTICLE: Three Products Help Cork Computer
Leaks, Feature Blocked Access,
Disk-File Encryption
NAME OF PERIODICAL: PC Week

VOLUME OF PERIODICAL: 2
NUMBER OF PERIODICAL: 18
ISSUE DATE: May 1985
PAGE NUMBER(S): 122-124
CATEGORY: General Security

DESCRIPTION: This article discusses a trio of
products to help prevent unauthorized access to a
computer system.




AUTHOR: Rosen, Richard D. and Dvorsky, James

TITLE OF ARTICLE: Portable Data Carrier Technology

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 12
NUMBER OF PERIODICAL: 1
ISSUE DATE: Winter 1988
PAGE NUMBER(S): 9-19
CATEGORY: General Security
DESCRIPTION: This article presents an overview of
the general field of portable data carrier
technology. Included are not only smart cards but
other devices and systems that are beginning to
emerge in the marketplace.

AUTHOR: Srinivasan, C.A. and Dascher, P.E.

TITLE OF ARTICLE: Computer Security and Integrity:
Problems and Prospects

NAME OF PERIODICAL: Infosystems

VOLUME OF PERIODICAL: 28
NUMBER OF PERIODICAL: 5
ISSUE DATE: May 1981
PAGE NUMBER(S): 5 Pages
CATEGORY: General Security

DESCRIPTION: Various aspects of computer security
are discussed including data security, data privacy,
data integrity, etc.

AUTHOR: Weller, Reginald H.

TITLE OF ARTICLE: Off-Site Data Storage: A Changing
Industry

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 5
ISSUE DATE: May/June 1985
PAGE NUMBER(S): 18-20
CATEGORY: General Security
DESCRIPTION: This article discusses selecting a
backup site while meeting the criteria of integrity,
reliability, access, reasonable cost, appropriate
location, good security, and comprehensive insurance
coverage.


AUTHOR: Wright, J.R. Jr.

TITLE OF ARTICLE: User Responsibility for Security

NAME OF PERIODICAL: Government Data Systems

VOLUME OF PERIODICAL: 15
NUMBER OF PERIODICAL: 1
ISSUE DATE: December 1985 through January 1986
PAGE NUMBER(S): 52-55
CATEGORY: General Security

DESCRIPTION: This article looks at the circular
"Management of Federal Information Resources"
printed by the Office of Management and Budget.
This circular provides guidance to Federal Managers
concerning computer security and the associated
responsibilities.

AUTHOR: Zimmerman, J.S.

TITLE OF ARTICLE: Is Your Computer Insecure?

NAME OF PERIODICAL: Datamation

VOLUME OF PERIODICAL: 31
NUMBER OF PERIODICAL: 10
ISSUE DATE: May 1985
PAGE NUMBER(S): 119-120
CATEGORY: General Security

DESCRIPTION: This article challenges widely
accepted notions concerning computer security. It
suggest that people's views should be changed so
that the challenge will be making a security system
work instead of beating it.

LAW AND ETHICS

AUTHOR: Bequai, August

TITLE OF ARTICLE: Federal Computer Crime
Legislation is Needed

NAME OF PERIODICAL: Data Management

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: May 1981
PAGE NUMBER(S): 22-24
CATEGORY: Law & Ethics

DESCRIPTION: The ways criminals use loopholes in
our present criminal justice system is discussed
along with a history of computer crime legislation.

AUTHOR: Betts, M.

TITLE OF ARTICLE: Reagan Systems Security
Directive Under Attack

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 27
ISSUE DATE: July 1985
PAGE NUMBER(S): 1
CATEGORY: Law & Ethics

DESCRIPTION: This article discusses why members of
congress are concerned over how the National
Security Decision Directive 145 on computer security
could be abused by military and intelligence
officials.


AUTHOR: Bigelow, R.P.

TITLE OF ARTICLE: Computer Security And Law

NAME OF PERIODICAL: Infosystems

VOLUME OF PERIODICAL: 29
NUMBER OF PERIODICAL: 12
ISSUE DATE: December 1982
PAGE NUMBER(S): 84
CATEGORY: Law & Ethics

DESCRIPTION: This article looks at how a memo from
the legal department should be structured concerning
the protection of assets.

AUTHOR: Hagopian, Greg

TITLE OF ARTICLE: Planning and Implementing a
Security Package

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 10
NUMBER OF PERIODICAL: 4
ISSUE DATE: Fall 1986
PAGE NUMBER(S): 17-20
CATEGORY: Law & Ethics
DESCRIPTION: This article discusses vendor selection
and legal issues.


AUTHOR: Roberts, J.E.

TITLE OF ARTICLE: Filing Software Copyrights

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 36
ISSUE DATE: September 1985
PAGE NUMBER(S): 116
CATEGORY: Law & Ethics

DESCRIPTION: This article describes how copyrighting
software is accomplished and what copyrighted
software means.


MICROCOMPUTER SECURITY

AUTHOR: Koelle, Jim

TITLE OF ARTICLE: What's in the Cards?

NAME OF PERIODICAL: Security

VOLUME OF PERIODICAL: 23
NUMBER OF PERIODICAL: 12
ISSUE DATE: December 1986
PAGE NUMBER(S): 42-44, and 46
CATEGORY: Microcomputer Security
DESCRIPTION: This article discusses microchips and
how they promise to revolutionize access card
technology with fast, calculating, and advanced
memories.

AUTHOR: Rhodes, B.

TITLE OF ARTICLE: Micro Security That Makes Sense

NAME OF PERIODICAL: Computer Decisions

VOLUME OF PERIODICAL: 17
NUMBER OF PERIODICAL: 9
ISSUE DATE: May 1985
PAGE NUMBER(S): 72, 74-76
CATEGORY: Microcomputer Security

DESCRIPTION: This article describes security
procedures that can be used by employees to solve
microcomputer security problems.


AUTHOR: Zimmerman, J.S.

TITLE OF ARTICLE: P.C. Security: So What's New

NAME OF PERIODICAL: Datamation

VOLUME OF PERIODICAL: 31
NUMBER OF PERIODICAL: 21
ISSUE DATE: November 1985
PAGE NUMBER(S): 89-92
CATEGORY: Microcomputer Security

DESCRIPTION: This article looks at the problems
data security officers are going to encounter even
as they implement safeguards for micros.

PHYSICAL SECURITY AND HARDWARE

AUTHOR: Call, B.

TITLE OF ARTICLE: Buttress Against Computer
Crime

NAME OF PERIODICAL: PC Week

VOLUME OF PERIODICAL: 2
NUMBER OF PERIODICAL: 18
ISSUE DATE: May 1985
PAGE NUMBER(S): 111, 115
CATEGORY: Physical Security & Hardware

DESCRIPTION: The physical protection of computers is
becoming an area of interest for more organizations.
The increased number of physical security devices
illustrates this point and is discussed in this
article.


AUTHOR: Epner, S.A.

TITLE OF ARTICLE: Computer Security: Plenty of
Questions but No Easy Answers

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL: 101
NUMBER OF PERIODICAL: 3
ISSUE DATE: March 1985
PAGE NUMBER(S): 74-76
CATEGORY: Physical Security & Hardware

DESCRIPTION: This article covers the physical
security of computer equipment including air
conditioning and power to pass cards and security
guards.


PRIVACY

AUTHOR: Jordan, Halmuth

TITLE OF ARTICLE: The Search for Privacy

NAME OF PERIODICAL: Security Management

VOLUME OF PERIODICAL: 31
NUMBER OF PERIODICAL: 11
ISSUE DATE: November 1987
PAGE NUMBER(S): 32-36
CATEGORY: Privacy
DESCRIPTION: This article focuses on some of the
difficulties the legal profession is having by
looking at American and West German law regarding
electronic surveillance.

RISK MANAGEMENT

AUTHOR: Armstrong, James R.

TITLE OF ARTICLE: Protecting the Corporate Data

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April, 1985
PAGE NUMBER(S): 16-17
CATEGORY: Risk Management
DESCRIPTION: This article discusses how most
alternative off-site lack the environmental control,
security and accessibility needed. Includes a
discussion on things to consider in selecting an
off-site storage facility.

AUTHOR: Bologna, Jack

TITLE OF ARTICLE: Disaster/Recovery Planning: A
Qualitative Approach
NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April 1984
PAGE NUMBER(S): 11-15
CATEGORY: Risk Management
DESCRIPTION: Developing a disaster/recovery plan
usually involves a detailed quantitative risk
analysis; the author offers a more qualitative
approach that is less time consuming and will obtain
a higher level of commitment from management, D/P
staff, and users.


AUTHOR: Bologna, Jack

TITLE OF ARTICLE: Industrial Security In a
Nutshell: A Risk by any Other
Name
NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 5
ISSUE DATE: May/June 1985
PAGE NUMBER(S): 12-13
CATEGORY: Risk Management
DESCRIPTION: This article discusses properly
understanding risk and how the opposite side of risk
is opportunity for growth and development.

AUTHOR: Bologna, Jack

TITLE OF ARTICLE: Risk Assessment Guidelines for
Fidelity Insurance

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April, 1985
PAGE NUMBER(S): 18-20
CATEGORY: Risk Management
DESCRIPTION: This article is a review of the
adequacy of asset protection plans, policies,
procedures and controls to enlighten top management.


AUTHOR: Helsing, Cherly W.

TITLE OF ARTICLE: Disaster Recovery Options

NAME OF PERIODICAL: Security

VOLUME OF PERIODICAL: 24
NUMBER OF PERIODICAL: 7
ISSUE DATE: July 1987
PAGE NUMBER(S): 100-103
CATEGORY: Risk Management
DESCRIPTION: This article has suggestions on how to
find a recovery plan that fits your firm without
damaging your profits.


AUTHOR: Linden, Jack

TITLE OF ARTICLE: Automated EDP Risk Analysis
and Management

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 1
ISSUE DATE: September/October 1984
PAGE NUMBER(S): 16-18
CATEGORY: Risk Management
DESCRIPTION: This article gives a cost effective
first step in developing a successful computer
security program using a cost benefit analysis
approach.


AUTHOR: Schweig, Barry B.

TITLE OF ARTICLE: Decision Matrix: A Risk Handling
Decision Aid

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April 1984
PAGE NUMBER(S): 16-18
CATEGORY: Risk Management
DESCRIPTION: This article discusses conceptualizing
a decision-matrix as an integral component of a risk
management process.

AUTHOR: Vernick, Paul R.

TITLE OF ARTICLE: Providing Data Processing
Recovery Backup

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April, 1985
PAGE NUMBER(S): 14-16
CATEGORY: Risk Management
DESCRIPTION: This article covers some of the major
emergency and recovery planning options available
that need to be considered prior to the occurrence
of any serious emergency.

SECURITY MANAGEMENT

AUTHOR: Bologna, Jack

TITLE OF ARTICLE: Security Planning: The "Tapps"
Method

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 10
NUMBER OF PERIODICAL: 4
ISSUE DATE: Fall 1986
PAGE NUMBER(S): 7-11
CATEGORY: Security Management
DESCRIPTION: This article covers a system approach
to assets protection. It discusses an analytical
process called Total Assets Protection Planning
System (TAPPS) which consist of organization,
structure and mandate of the security function.


AUTHOR: Bologna, Jack

TITLE OF ARTICLE: Selling Computer Security to
Top Management

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 5
ISSUE DATE: May/June 1984
PAGE NUMBER(S): 13-16
CATEGORY: Security Management
DESCRIPTION: This article discusses positive
motivational impact, minimizing risk, and cost
feasibility in selling computer security to top
managers.


AUTHOR: Bologna, Jack

TITLE OF ARTICLE: Why the Corporate Security
Function is Being Downsized

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 11
NUMBER OF PERIODICAL: 2
ISSUE DATE: Spring 1987
PAGE NUMBER(S): 20-21
CATEGORY: Security Management
DESCRIPTION: This article discusses the disbanding
and dilution of corporate security functions and
how this effects the security of a firm.

AUTHOR: Goldstein, Bruce

TITLE OF ARTICLE: Information Security: The
Information Resource Management
Approach
NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 5
ISSUE DATE: May/June 1984
PAGE NUMBER(S): 18-22
CATEGORY: Security Management
DESCRIPTION: This article addresses information as
a asset that must be protected as any other asset.
It also discusses information research management
providing the framework for a comprehensive
information security program.


AUTHOR: Harris, N.L.

TITLE OF ARTICLE: Rigid Administrative Procedures
Prevent Computer Security
Failure
NAME OF PERIODICAL: Data Management

VOLUME OF PERIODICAL: 22
NUMBER OF PERIODICAL: 12
ISSUE DATE: December 1984
PAGE NUMBER(S): 13-14, 16
CATEGORY: Security Management

DESCRIPTION: The best way to keep a security program
from failing is the use of strict administrative
procedures. This article also discusses why some
systems fail.


AUTHOR: Reber, Jan

TITLE OF ARTICLE: The Essence of Industrial
Espionage

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 10
NUMBER OF PERIODICAL: 1
ISSUE DATE: Winter 1986
PAGE NUMBER(S): 24-25
CATEGORY: Security Management
DESCRIPTION: This article discusses understanding
espionage by a characteristic all spies have in
common "access to the target".

SOFTWARE AND OPERATING SYSTEM SECURITY

AUTHOR: Adler, Stacy

TITLE OF ARTICLE: 7 Myths of Computer Security

NAME OF PERIODICAL: Security

VOLUME OF PERIODICAL: 24
NUMBER OF PERIODICAL: 1
ISSUE DATE: January 1987
PAGE NUMBER(S): 50-52
CATEGORY: Software & Operating System Security
DESCRIPTION: This article covers consultants that
clear misconceptions about data protection software.


AUTHOR: Edwards, J.

TITLE OF ARTICLE: Ends in Sight for the
Copy-Protection Debate

NAME OF PERIODICAL: PC Week

VOLUME OF PERIODICAL: 3
NUMBER OF PERIODICAL: 1
ISSUE DATE: January 1986
PAGE NUMBER(S): 101 & 105
CATEGORY: Software & Operating System Security

DESCRIPTION: This protection of software from
unauthorized use may be coming to an end as
Microsoft Corporation has decided to lift the
protection from several of its software programs.


AUTHOR: Koreniowski, P.

TITLE OF ARTICLE: Adapso Making Progress on
Software Protection Device

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 24
ISSUE DATE: June 1985
PAGE NUMBER(S): 8
CATEGORY: Software & Operating System Security

DESCRIPTION: This article discusses how the
Association of Data Processing Service Organizations
(ADAPSO) is getting ready to announce its progress
in creating a software authorization mechanism.


AUTHOR: Schriever, Joe F.

TITLE OF ARTICLE: Structuring for Security

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 1
ISSUE DATE: September/October 1984
PAGE NUMBER(S): 14-16
CATEGORY: Software & Operating System Security
DESCRIPTION: This article is a set of guidelines
that will remove ambiguities as to what will be
done by whom to provide system security.


TRAINING AND AWARENESS

AUTHOR: Bezdek, J.

TITLE OF ARTICLE: Across-the-Board Training
Protects Data

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 18
NUMBER OF PERIODICAL: 44
ISSUE DATE: October 1984
PAGE NUMBER(S): SR-10
CATEGORY: Training & Awareness

DESCRIPTION: This special report covers the four
areas that a training program in computer security
needs to include. These are plant physical security,
logical security, administrative security, and the
legal and social aspects of security training.


AUTHOR: Bound, W.A.J.

TITLE OF ARTICLE: Security Protecting Information
Resources and Media

NAME OF PERIODICAL: Information Management

VOLUME OF PERIODICAL: 18
NUMBER OF PERIODICAL: 8
ISSUE DATE: August 1984
PAGE NUMBER(S): 18-19
CATEGORY: Training & Awareness

DESCRIPTION: This article discusses what a manager
must consider when designing an office security
program to protect against the four vulnerabilities
of a system: personnel, physical, administrative,
and technical.

AUTHOR: Johnston, R.E.

TITLE OF ARTICLE: What You Need To Know

NAME OF PERIODICAL: Infosystems

VOLUME OF PERIODICAL: 32
NUMBER OF PERIODICAL: 1
ISSUE DATE: January 1985
PAGE NUMBER(S): 56
CATEGORY: Training & Awareness

DESCRIPTION: Outlined in this article are those
things that should be considered when establishing
a computer security program or updating an existing
program.


AUTHOR: Leuser, K.G.

TITLE OF ARTICLE: Security Programs: Only as
Good as We Make Them

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL: 100
NUMBER OF PERIODICAL: 2
ISSUE DATE: August 1984
PAGE NUMBER(S): 91-92
CATEGORY: Training & Awareness

DESCRIPTION: Discusses how an effective security
program helps to foil or discourage people with
dishonest intentions. Looks at the office
administrator's domain to identify areas of
potential vulnerability.

AUTHOR: Weber, A.

TITLE OF ARTICLE: Effective Security Programs
Start with Awareness

NAME OF PERIODICAL: Data Management

VOLUME OF PERIODICAL: 23
NUMBER OF PERIODICAL: 11
ISSUE DATE: November 1985
PAGE NUMBER(S): 34-35
CATEGORY: Training & Awareness

DESCRIPTION: Educating end users is the key to
helping prevent crime and computer abuse in an
organization.


AUTHORS NOT SPECIFIED

ABUSE/MISUSE/CRIME

AUTHOR: Not Specified

TITLE OF ARTICLE: Computer "Hacking" is No Longer
Just a Lark

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL: 102
NUMBER OF PERIODICAL: 3
ISSUE DATE: September 1985
PAGE NUMBER(S): 90-95
CATEGORY: Abuse/Misuse/Crime

DESCRIPTION: Computer hackers will use computers to
obtain information and resell it, use it for
blackmail, extortion, and espionage. This article
discusses techniques for preventing hackers from
getting on a system, and monitoring them if they are
discovered.


AUTHOR: Not Specified

TITLE OF ARTICLE: Computer Security: The Menace
is Human Error

NAME OF PERIODICAL: Office

VOLUME OF PERIODICAL: 99
NUMBER OF PERIODICAL: 3
ISSUE DATE: March 1984
PAGE NUMBER(S): 119-120
CATEGORY: Abuse/Misuse/Crime

DESCRIPTION: This article stresses that managers
should understand that data security is a people
problem and not a computer problem. People are the
ones that either accidentally or intentionally
misuse a computer system.


AUTHOR: Not Specified

TITLE OF ARTICLE: Internal Security

NAME OF PERIODICAL: PC Week

VOLUME OF PERIODICAL: 2
NUMBER OF PERIODICAL: 18
ISSUE DATE: May 1985
PAGE NUMBER(S): 89-91, 106-107
CATEGORY: Abuse/Misuse/Crime

DESCRIPTION: Experts feel that local computer access
is more prone to intrusion than long-distance
access. This article discusses how insiders in a
company are the ones most likely to abuse a computer
system.

AUTHOR: Not Specified

TITLE OF ARTICLE: Reporting Computer Crime

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 6
ISSUE DATE: July/August 1984
PAGE NUMBER(S): 20-21
CATEGORY: Abuse/Misuse/Crime
DESCRIPTION: This article presents a suggested
format for a final report to use in documenting
actions surrounding a computer crime.


ACCESS CONTROL


AUTHOR: Not Specified

TITLE OF ARTICLE: Communications and Systems
Security

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 3
ISSUE DATE: 1985 Buyer's Directory
PAGE NUMBER(S): 11-13
CATEGORY: Access Control
DESCRIPTION: This article discusses a wide variety
of communications and system security protection
methods. Includes encryption, fiber optics, key
management, optical links, electrical emanations,
and dial-up access protection devices.


AUTHOR: Not Specified

TITLE OF ARTICLE: Computer Communications
Security Lexicon

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 11
NUMBER OF PERIODICAL: 2
ISSUE DATE: Spring 1987
PAGE NUMBER(S): 22-23
CATEGORY: Access Control
DESCRIPTION: This article is an update containing
some new added security definitions of terms and
phrases.

AUTHOR: Not Specified

TITLE OF ARTICLE: Controlling Access To Your Data

NAME OF PERIODICAL: Personal Computing

VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 9
ISSUE DATE: September 1985
PAGE NUMBER(S): 60-72
CATEGORY: Access Control

DESCRIPTION: Explains measures that can be taken
to protect what's in a computer. Focuses not only
on vandals, but also on people who accidentally harm
the computer.



AUTHOR: Not Specified

TITLE OF ARTICLE: Dial-Up Access Security Products

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 2
ISSUE DATE: November/December 1984
PAGE NUMBER(S): 21-24
CATEGORY: Access Control
DESCRIPTION: This article presents some new dial-up
access security products and their major features.



AUTHOR: Not Specified

TITLE OF ARTICLE: Enhancements Out For Barrier
Security Devices

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 18
NUMBER OF PERIODICAL: 35
ISSUE DATE: August 1984
PAGE NUMBER(S): 51
CATEGORY: Access Control

DESCRIPTION: This article discusses the password
protection device designed by International Anasazi,
Inc. that will limit access on dial-up lines.



AUTHOR: Not Specified

TITLE OF ARTICLE: Firesign Unwraps Security
Feature

NAME OF PERIODICAL: MIS Week

VOLUME OF PERIODICAL: 5
NUMBER OF PERIODICAL: 23
ISSUE DATE: June 1984
PAGE NUMBER(S): 24
CATEGORY: Access Control

DESCRIPTION: This article discusses Firesign
Computer Company's product that provides for network
security by its password system.


AUTHOR: Not Specified

TITLE OF ARTICLE: Security Computer Outsmarts
Colorado Bandits

NAME OF PERIODICAL: Data Management

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 7
ISSUE DATE: July 1981
PAGE NUMBER(S): 17-18
CATEGORY: Access Control

DESCRIPTION: This article looks at the effectiveness
of a security system that controls access to several
high-rise buildings in Colorado.


AUTHOR: Not Specified

TITLE OF ARTICLE: Security Lock Ready for PCs

NAME OF PERIODICAL: MIS Week

VOLUME OF PERIODICAL: 6
NUMBER OF PERIODICAL: 26
ISSUE DATE: July 1985
PAGE NUMBER(S): 30
CATEGORY: Access Control

DESCRIPTION: The hard disk security product "Knight
Data Security Manager" is discussed. This product
allows password protection in a PC.


CONTINGENCY PLANNING

AUTHOR: Not Specified

TITLE OF ARTICLE: Automated Contingency Planning

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April 1984
PAGE NUMBER(S): 22
CATEGORY: Contingency Planning
DESCRIPTION: This article presents a special
purpose software package CHI/COR that deals with
the job of documenting the resources needed to
implement a disaster recovery plan.

AUTHOR: Not Specified

TITLE OF ARTICLE: Contingency Planning and the Law

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April 1984
PAGE NUMBER(S): 17-18
CATEGORY: Contingency Planning
DESCRIPTION: This article reviews the Foreign
Corrupt Practices Act and its requirement for record
keeping and internal controls. Other potential legal
liabilities are also reviewed.

ENVIRONMENTAL SECURITY

AUTHOR: Not Specified

TITLE OF ARTICLE: Computer Power and Environmental
Controls

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 3
ISSUE DATE: 1985 Buyer's Directory
PAGE NUMBER(S): 13
CATEGORY: Environmental Security
DESCRIPTION: This article discusses common power
anomalies and equipment available to overcome them.

GENERAL SECURITY

AUTHOR: Not Specified

TITLE OF ARTICLE: Computer Back-up Facilities

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April 1984
PAGE NUMBER(S): 19-22
CATEGORY: General Security
DESCRIPTION: This article discusses the options of
back-up sites including cold sites, hot sites, or
empty shell, or fully equipped recovery sites. Also
refers to the extent of equipment, space, and
services provided by these back-up facilities.


AUTHOR: Not Specified

TITLE OF ARTICLE: Computer Security: Issues and
Answers

NAME OF PERIODICAL: Datamation

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: September 15, 1984
PAGE NUMBER(S): 16 Pages
CATEGORY: General Security

DESCRIPTION: This 16-page section sponsored by the
Computer Security Institute contains several
articles that cover a variety of computer security
issues.

AUTHOR: Not Specified

TITLE OF ARTICLE: Computer Security: Issues and
Answers

NAME OF PERIODICAL: Datamation

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: September 15 1985
PAGE NUMBER(S): 24 Pages
CATEGORY: General Security

DESCRIPTION: This advertisement section contains
eight articles that discuss a variety of computer
security issues. The authors include FBI Director
William Webster and Department of Defense Computer
Security Center Director Robert Brotzman.


AUTHOR: Not Specified

TITLE OF ARTICLE: Making The Case For Computer
Security Pure and Simple

NAME OF PERIODICAL: Datamation

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: September 1983
PAGE NUMBER(S):
CATEGORY: General Security

DESCRIPTION: This section of Datamation is sponsored
by the Computer Security Institute and covers a
broad range of computer security issues in several
different articles.


AUTHOR: Not Specified

TITLE OF ARTICLE: Personal Computers vs. Data
Data Security: the Two Need
Not Be Incompatible
NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 12
NUMBER OF PERIODICAL: 1
ISSUE DATE: Winter 1988
PAGE NUMBER(S): 24-26
CATEGORY: General Security
DESCRIPTION: This article discusses the threat of
data loss either intentional or unintentional. It
examines the significant risks and the data security
policies to lower these risks.

AUTHOR: Not Specified

TITLE OF ARTICLE: Protecting Information and
Interest

NAME OF PERIODICAL: Computer Management

VOLUME OF PERIODICAL:
NUMBER OF PERIODICAL:
ISSUE DATE: October 1981
PAGE NUMBER(S): 33-34, 36
CATEGORY: General Security

DESCRIPTION: Suppliers, consultants, and services
related to computer security are listed in this
directory.

AUTHOR: Not Specified

TITLE OF ARTICLE: Simple Security Precautions
Ensure Information Safety

NAME OF PERIODICAL: Computerworld

VOLUME OF PERIODICAL: 19
NUMBER OF PERIODICAL: 17
ISSUE DATE: April 1985
PAGE NUMBER(S): SR-38
CATEGORY: General Security

DESCRIPTION: This article applies many of the
security precautions for mainframes to the
microcomputer.


MICROCOMPUTER SECURITY

AUTHOR: Not Specified

TITLE OF ARTICLE: Memo: Disaster Plan For
Microcomputer Users

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April 1984
PAGE NUMBER(S): 27-29
CATEGORY: Microcomputer Security
DESCRIPTION: This article is in the form a memo
containing a microcomputer disaster recovery
checklist. It address issues that should be taken in
contingency plans.

PHYSICAL SECURITY AND HARDWARE

AUTHOR: Not Specified

TITLE OF ARTICLE: Media Safes: Countering the
Threats of Fire

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 6
ISSUE DATE: July/August 1985
PAGE NUMBER(S): 18-20
CATEGORY: Physical Security & Hardware
DESCRIPTION: This article is a review of critical
basic information on how to select fire resistant
media safes.

RISK MANAGEMENT

AUTHOR: Not Specified

TITLE OF ARTICLE: Protecting The World's Largest
Computer User

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April 1984
PAGE NUMBER(S): 25-26
CATEGORY: Risk Management
DESCRIPTION: This article discusses a new high
security off-site storage facility opening in
Beltsville, Maryland. It also address concern with
the lack of proper security storage today.

SECURITY MANAGEMENT

AUTHOR: Not Specified

TITLE OF ARTICLE: Computer Security Awareness:
Organizations and Senior
Management Concerns
NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 5
ISSUE DATE: May/June 1984
PAGE NUMBER(S): 12-13
CATEGORY: Security Management
DESCRIPTION: This article gives the result of a
survey of general security and computer security
personnel, EDP auditors, and internal auditors to
determine the computer security awareness of their
company and senior management.

AUTHOR: Not Specified

TITLE OF ARTICLE: Records Storage and Management

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 4
ISSUE DATE: March/April 1984
PAGE NUMBER(S): 23-25
CATEGORY: Security Management
DESCRIPTION: This article addresses the questions
which records should be stored off-site, and how
can an off-site facility be evaluated? It also
provides an overview of areas to consider.


SOFTWARE AND OPERATING SYSTEM SECURITY

AUTHOR: Not Specified

TITLE OF ARTICLE: Computer Security Software

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 1
ISSUE DATE: September/October 1984
PAGE NUMBER(S): 19-24
CATEGORY: Software & Operating System Security
DESCRIPTION: This article provides information for
using access control software to protect the
terminals, the data and the system itself from
unauthorized use.

AUTHOR: Not Specified

TITLE OF ARTICLE: Computer Security Software

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 9
NUMBER OF PERIODICAL: 3
ISSUE DATE: 1985 Buyer's Directory
PAGE NUMBER(S): 17-18
CATEGORY: Software and Operating System Security
DESCRIPTION: This article addresses a wide variety
of computer security software programs and their
different uses.

AUTHOR: Not Specified

TITLE OF ARTICLE: Protecting Software With
Escrow Services

NAME OF PERIODICAL: Data Processing &
Communications Security
VOLUME OF PERIODICAL: 8
NUMBER OF PERIODICAL: 5
ISSUE DATE: May/June 1984
PAGE NUMBER(S): 22-24
CATEGORY: Software & Operating System Security
DESCRIPTION: This article addresses some of the
problems and answers for protecting software that
concerns major management today.
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS