{"title":"计算机安全的国家视角","authors":"L. G. Becker","doi":"10.1145/800171.809637","DOIUrl":null,"url":null,"abstract":"Computers and associated resources influence many aspects of modern society. While the continuing dependence on information technology and the fifth generation of computers prompts attention to potential abuse and misuse of these resources. Recent concerns have focused on the possible harm to the nation, society and individuals from misuse and abuse of computerized resources. The intentional and unintentional threats to computerized resources triggers consideration of appropriate measures to cope with the problems of computer vulnerabilities. The potential and real danger of unauthorized disclosures, unwarranted manipulation of data, degradation of services and capability, and destruction of resources prompts attention to protecting computerized resources in the fifth generation and beyond.\n This paper examines some of the major computer security problems and remedies within the broad context of defense and national security, critical systems, privacy and confidentiality, and computer crime. Highlights of specific problems confronting decisionmakers in selecting the appropriate approach to protecting computerized resources are reviewed. The paper reviews recent legislative proposals and executive branch actions as well as private sector activities having implications on future developments. This paper explores some of the problems that may require a more comprehensive examination by government and the private sector to assure that computer security requirements are met by the fifth generation. Identification of some of the critical issues related to implementing computer security measures will be a major focus. The prospects for new technology to meet the fifth generation requirements will be outlined.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A national perspective on computer security\",\"authors\":\"L. G. Becker\",\"doi\":\"10.1145/800171.809637\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computers and associated resources influence many aspects of modern society. While the continuing dependence on information technology and the fifth generation of computers prompts attention to potential abuse and misuse of these resources. Recent concerns have focused on the possible harm to the nation, society and individuals from misuse and abuse of computerized resources. The intentional and unintentional threats to computerized resources triggers consideration of appropriate measures to cope with the problems of computer vulnerabilities. The potential and real danger of unauthorized disclosures, unwarranted manipulation of data, degradation of services and capability, and destruction of resources prompts attention to protecting computerized resources in the fifth generation and beyond.\\n This paper examines some of the major computer security problems and remedies within the broad context of defense and national security, critical systems, privacy and confidentiality, and computer crime. Highlights of specific problems confronting decisionmakers in selecting the appropriate approach to protecting computerized resources are reviewed. The paper reviews recent legislative proposals and executive branch actions as well as private sector activities having implications on future developments. This paper explores some of the problems that may require a more comprehensive examination by government and the private sector to assure that computer security requirements are met by the fifth generation. Identification of some of the critical issues related to implementing computer security measures will be a major focus. The prospects for new technology to meet the fifth generation requirements will be outlined.\",\"PeriodicalId\":218138,\"journal\":{\"name\":\"ACM '84\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM '84\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/800171.809637\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '84","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800171.809637","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Computers and associated resources influence many aspects of modern society. While the continuing dependence on information technology and the fifth generation of computers prompts attention to potential abuse and misuse of these resources. Recent concerns have focused on the possible harm to the nation, society and individuals from misuse and abuse of computerized resources. The intentional and unintentional threats to computerized resources triggers consideration of appropriate measures to cope with the problems of computer vulnerabilities. The potential and real danger of unauthorized disclosures, unwarranted manipulation of data, degradation of services and capability, and destruction of resources prompts attention to protecting computerized resources in the fifth generation and beyond.
This paper examines some of the major computer security problems and remedies within the broad context of defense and national security, critical systems, privacy and confidentiality, and computer crime. Highlights of specific problems confronting decisionmakers in selecting the appropriate approach to protecting computerized resources are reviewed. The paper reviews recent legislative proposals and executive branch actions as well as private sector activities having implications on future developments. This paper explores some of the problems that may require a more comprehensive examination by government and the private sector to assure that computer security requirements are met by the fifth generation. Identification of some of the critical issues related to implementing computer security measures will be a major focus. The prospects for new technology to meet the fifth generation requirements will be outlined.