Watching systems in action: security at the periphery
Abstract
Computer security is maintained in many ways. New systems are developed with an eye towards protecting against known techniques for bypassing system controls. New methods of fraud, especially in point of sale systems, appear in spite of these protections. Consequently, there is a continuing need to examine how systems are used in practice and to implement new controls to prevent the incidence and recurrence of fraud. This paper cites examples of new frauds, suggests general techniques for protecting against the original appearance and recurrence of such frauds, and proposes that the maintenance of computer systems include continuing attention to these controls.
Keywords
Citation
Grupe, F.H., Hensley, J.M. and Yamamura, J.H. (1998), "Watching systems in action: security at the periphery", Information Management & Computer Security, Vol. 6 No. 4, pp. 155-159. https://doi.org/10.1108/09685229810232418
Publisher
:MCB UP Ltd
Copyright © 1998, MCB UP Limited