To read this content please select one of the options below:

Watching systems in action: security at the periphery

Fritz H. Grupe (Department of Accounting and CIS/026, University of Nevada, Reno, Nevada, USA)
James M. Hensley (Department of Accounting and CIS/026, University of Nevada, Reno, Nevada, USA)
Jeanne H. Yamamura (Department of Accounting and CIS/026, University of Nevada, Reno, Nevada, USA)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 October 1998

678

Abstract

Computer security is maintained in many ways. New systems are developed with an eye towards protecting against known techniques for bypassing system controls. New methods of fraud, especially in point of sale systems, appear in spite of these protections. Consequently, there is a continuing need to examine how systems are used in practice and to implement new controls to prevent the incidence and recurrence of fraud. This paper cites examples of new frauds, suggests general techniques for protecting against the original appearance and recurrence of such frauds, and proposes that the maintenance of computer systems include continuing attention to these controls.

Keywords

Citation

Grupe, F.H., Hensley, J.M. and Yamamura, J.H. (1998), "Watching systems in action: security at the periphery", Information Management & Computer Security, Vol. 6 No. 4, pp. 155-159. https://doi.org/10.1108/09685229810232418

Publisher

:

MCB UP Ltd

Copyright © 1998, MCB UP Limited

Related articles