OCR Text |
Show 6 MILL TOP TIMES Look at security before installing personal computers Morgan Schow By Information Systems Personal computers, or PCs as they are commonly called, are becoming more prevalent across the base. With the increase of these, there are many questions about security, a matter that should be considered prior to the installation phase. An automated information system, regardless of size and nature, must meet major security objectives. These include: Confidentiality of personal, proprietary or otherwise sensitive data handled by the system Integrity and accuracy of data and the processes that handle the data Availability of systems and the data or services they support Although PCs provide essentially the same functions as large systems, they have characteristics that present special security problems . Evaluation of PC security risks can be a complex process. Risks are dependent upon many factors, the most important of which are the sensitivity and of the information and the operational environment. As an aid to the PC manager in evaluating list the security risks, a will has been developed. The list provide an indication as to whether there is a potential crit-icalne- self-inspecti- on 15-questi- on self-inspecti- on ss PC security problem. The questions are general in nature and should be addressed to the individual PC andor the organization using the PC. These questions are: 7'v7'';:' Are there organizational policies and procedures for the handling of sensitive information? Are the procedures protecting any sensitive information handled on the PC in line with other sensitive information procedures within the organization? Are the policies concerning personal use of PC equipment clearly defined? - Are users adequately trained on the PC equipment and aware of the organization's security policy and individual responsibility? Is the equipment adequately protected from theft, damage or unauthorized use? Are proper storage facilities provided for the security sensitive media (hard copy, removable disks, ,' .. etc.)? Are adequate procedures available for the proper handling and storage of sensitive media? Are adequate procedures available for the proper disposal of sensitive media (e.g., shredding of, purging of diskettes, etc.) Can shared software be protected from un.7-v:'- 'v: detected modification? Is proper training available for using PC software : :C-tools? 7:7 Are major PC application systems being developed in accordance with existing system development ' .controls? 7 Are.adequate controls available to control user access to the PC? If the PC shares a fixed disk with other users, is adequate file access control available? If the PC is connected to a local area network and there is a need for message security, are there adequate communication security measures in place? ' Ideally we would like to be able to answer yes to all of the above questions. This would indicate a PC environment. However, most PC environments do have problems. If three or more questions are answered no, you have a potential security problem; six or more questions answered no indicates a potentially serious security problem requiring quick . ; ' well-controll- ed action. Help for security problems is available from your local computer security manager. You may also contact the Information Systems Security Manager, Morgan Schow, at Ext. 72414. Remember, the sooner the security problems about PCs are resolved, the sooner you may fully enjoy the world of personal computers. - Can data produced on the PC be adequately dated by existing procedures? vali- Civilians must use seat belts , too Department of Defense employees still must wear seat belts despite a recent report by the National Transportation Safety Board raising questions about the effectiveness of rear seat belts. DOD policy requires everyone riding in a DOD motor vehicle to wear safety belts on or off DOD installations, and to wear seat belts even in privately owned or rented vehicles while on a DOD installation. According to DOD officials, the NTSB report," released in August, is not conclusive and may be misleading since it considered only 26 automobile crashes in which rear-sepassengers were more frequently killed or seriously injured than those not wearing a belt. "I'm concerned that the report may be misleading the public with the imat plication Traffic Safety Administration. tarn Published by MorMedia, Inc., a private firm in no way U.S. Air Force, under exclusive written contract with Hill AFB. This commercial enterprise Air Force newspaper is an authorized publication for members of the U.S. military services. Contents of the Hill Top Times are not necessarily the official views of, or endorsed by, the U.S. Government, the Department of Defense, or the Department of the Air Force. The appearance of advertisements in this publication, including inserts or supplements, does not constitute endorsement by the Department of the Air Force or MorMedia, Inc. of the products or services advertised.. Everything advertised in this publication shall be made available for purchase, use or patronage without regard to race, color, religion, sex, national origin, age, marital status, physical handicap, political affiliation or any other nonmerit factor of the purchaser, user or patron. Editorial content is edited, prepared and provided connected with the by the Public Affairs Office of Ogden Air Logistics Center. Hill AFB Editorial Staff: Public Affairs Officer . . .Lt. Col. Larry P. Summers Editor .Chris Baierschmidt Staff Writers Ernie Shannon, Ralph Jensen SSgt. Louis A. Arana-Barrada- s, A1C Jay that people would be better off not using lap belts when riding in the rear seat of a car," said Diane Steed, administrator of the National Highway A. Joersz Deadlines: Editorial: 4 p.m. Monday week of publication "Around the Hill" items: 10 a.m. Monday week of publication Classified ads: 2 p.m. Wednesday week of She said that agency's studies, involving thousands of accident cases, clearly show rear-sepassengers have a better chance of avoiding serious injury or death by wearing a lap belt. TVe are aware that in rare instances, in certain types of accidents, injuries or even fatalities can occur from the safety belt itself," said Ms. Steed. "But," she added, "our overall conclusion is that a person riding in the rear seat of a motor vehicle has a much better chance of avoiding serious injury or death." at Day honors civil rights activist Monday will mark the second observance of a holiday honoring slain civil rights leader Dr. Luther King Jr. 7 Jan. 1419 has been designated "King Week '8T in memory of the slain civil rights leader. The theme of this year's observance is "Living the Dream: Let Freedom Ring!" Secretary of Defense Caspar W Weinberger said King Week "87 will represent an opportunity for the Department of Defense "to demonstrate our commitment to our nation's tradition of respect for individual human rights and dignity." Mr. Weinberger urged Department of Defense installations to demonstrate this commitment with programs, activities and special observances honoring Dr. King. social change , , Dr. King s philosophy of which he preached during 13 years of civil rights activities, sparked the conscience of a generation. He led movements and marches that brought significant changes in American attitudes. His charismatic leadership inspired men and women, young and old, in the United States and abroad. Congress set up the national observance to "serve as a time for Americans to reflect on the principles of racial equality and social change esMartin Luther poused by King Jr." Coretta Scott King, his widow, has called on Ameiv cans to celebrate his birthday as "a time for peace in all our human relationships and and in every aspect of our personal lives... a day. when all of us put aside our differences and join in a spirit of togetherness in recognition of our common hu.. manity.". non-viole- nt non-viole- nt non-violen- ce - |