Source code security: a checklist for managers

Jon Corelis
{"title":"Source code security: a checklist for managers","authors":"Jon Corelis","doi":"10.1145/382266.382431","DOIUrl":null,"url":null,"abstract":"Although computer security is usually thought of as data security, the protection of the executable software which creates and maintains that data is an equally important aspect of security. This article will describe the general principles for securing source code integrity in the computer services department of a medium to large size organization. It is addressed to the EDP manager, auditor, or user who has primary administrative, rather than technical, responsibility for the security of such code. My treatment of these issues will inevitably reflect my own primary experience of them, which has been with mainframe batch data processing applications. But the underlying principles of source code security are the same for all types of software, whether batch, interactive, or micro. Accordingly, I may hope that my discussion of these problems will be of some use also to those who must manage other types of data processing.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1987-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Siguccs Newsletter","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/382266.382431","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Although computer security is usually thought of as data security, the protection of the executable software which creates and maintains that data is an equally important aspect of security. This article will describe the general principles for securing source code integrity in the computer services department of a medium to large size organization. It is addressed to the EDP manager, auditor, or user who has primary administrative, rather than technical, responsibility for the security of such code. My treatment of these issues will inevitably reflect my own primary experience of them, which has been with mainframe batch data processing applications. But the underlying principles of source code security are the same for all types of software, whether batch, interactive, or micro. Accordingly, I may hope that my discussion of these problems will be of some use also to those who must manage other types of data processing.
源代码安全性:管理人员的检查清单
虽然计算机安全通常被认为是数据安全,但保护创建和维护这些数据的可执行软件也是安全的一个重要方面。本文将描述在大中型组织的计算机服务部门中保护源代码完整性的一般原则。它针对的是对此类代码的安全性负有主要管理责任(而不是技术责任)的EDP经理、审计员或用户。我对这些问题的处理将不可避免地反映我自己在这些问题上的主要经验,这些经验是与大型机批处理数据处理应用程序有关的。但是源代码安全性的基本原则对于所有类型的软件都是一样的,无论是批处理软件、交互式软件还是微型软件。因此,我可能希望我对这些问题的讨论对那些必须管理其他类型数据处理的人也会有所帮助。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信