Removal of all unauthorized access paths in production software

Charles Cresson Wood (Independent Information Security Consultant, Sausalito, California, USA)

Information Management & Computer Security

ISSN: 0968-5227

Publication date: 1 December 1996


Presents a policy considered necessary to prevent breaches of security when software is moved from development to production. Contends that although information is a valuable, global commodity it is often unprotected. Presents suggestions to prevent encryption code from being broken. Gives guidelines for the security of encryption keys. Looks at the costs and benefits of encryption, packet encryption and the Internet. Discusses US policy, the US Computer Security Act and the US government proposals for information security



Cresson Wood, C. (1996), "Removal of all unauthorized access paths in production software", Information Management & Computer Security, Vol. 4 No. 5, pp. 22-23.

Download as .RIS




Copyright © 1996, Company

Please note you might not have access to this content

You may be able to access this content by login via Shibboleth, Open Athens or with your Emerald account.
If you would like to contact us about accessing this content, click the button and fill out the form.
To rent this content from Deepdyve, please click the button.