TY - JOUR AB - Presents a policy considered necessary to prevent breaches of security when software is moved from development to production. Contends that although information is a valuable, global commodity it is often unprotected. Presents suggestions to prevent encryption code from being broken. Gives guidelines for the security of encryption keys. Looks at the costs and benefits of encryption, packet encryption and the Internet. Discusses US policy, the US Computer Security Act and the US government proposals for information security VL - 4 IS - 5 SN - 0968-5227 DO - 10.1108/09685229610153148 UR - https://doi.org/10.1108/09685229610153148 AU - Cresson Wood Charles PY - 1996 Y1 - 1996/01/01 TI - Removal of all unauthorized access paths in production software T2 - Information Management & Computer Security PB - MCB UP Ltd SP - 22 EP - 23 Y2 - 2024/04/25 ER -