Evaluating and managing the integrity of computerized accountability systems against insider threats

PDF Version Also Available for Download.

Description

Accountability applications such as nuclear material accountability systems at Department of Energy (DOE) facilities provide for tracking inventories, documenting transactions, issuing periodic reports, and assisting in the detection of unauthorized system access and data falsification. Insider threats against the system represent the potential to degrade the integrity with which these functions are addressed. While preventing unauthorized access by external threats is vital, it is also critical to understand how application features affect the ability of insiders to impact the integrity of data in the system. Aspects of modern computing systems including powerful personal computers and applications on networks, mixed security ... continued below

Physical Description

10 p.

Creation Information

Jones, E. & Sicherman, A. June 1, 1996.

Context

This article is part of the collection entitled: Office of Scientific & Technical Information Technical Reports and was provided by UNT Libraries Government Documents Department to Digital Library, a digital repository hosted by the UNT Libraries. More information about this article can be viewed below.

Who

People and organizations associated with either the creation of this article or its content.

Sponsor

Publisher

Provided By

UNT Libraries Government Documents Department

Serving as both a federal and a state depository library, the UNT Libraries Government Documents Department maintains millions of items in a variety of formats. The department is a member of the FDLP Content Partnerships Program and an Affiliated Archive of the National Archives.

Contact Us

What

Descriptive information to help identify this article. Follow the links below to find similar items on the Digital Library.

Description

Accountability applications such as nuclear material accountability systems at Department of Energy (DOE) facilities provide for tracking inventories, documenting transactions, issuing periodic reports, and assisting in the detection of unauthorized system access and data falsification. Insider threats against the system represent the potential to degrade the integrity with which these functions are addressed. While preventing unauthorized access by external threats is vital, it is also critical to understand how application features affect the ability of insiders to impact the integrity of data in the system. Aspects of modern computing systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased software knowledge and skills help heighten the concern about insider threats. A question arises as follows. How can managers and policy makers logically and pragmatically analyze the myriad customization and design options for accountability applications with respect to the insider threat. In this paper, we describe a methodology for addressing this question, along with insights from its application to local area network (LAN) material accountability systems.

Physical Description

10 p.

Notes

OSTI as DE96050335

Source

  • 12. annual security technology symposium, Williamsburg, VA (United States), 17-20 Jun 1996

Language

Item Type

Identifier

Unique identifying numbers for this article in the Digital Library or other systems.

  • Other: DE96050335
  • Report No.: UCRL-JC--124361
  • Report No.: CONF-9606221--8
  • Grant Number: W-7405-ENG-48
  • Office of Scientific & Technical Information Report Number: 378783
  • Archival Resource Key: ark:/67531/metadc687115

Collections

This article is part of the following collection of related materials.

Office of Scientific & Technical Information Technical Reports

What responsibilities do I have when using this article?

When

Dates and time periods associated with this article.

Creation Date

  • June 1, 1996

Added to The UNT Digital Library

  • July 25, 2015, 2:20 a.m.

Description Last Updated

  • Feb. 18, 2016, 3:27 p.m.

Usage Statistics

When was this article last used?

Yesterday: 0
Past 30 days: 0
Total Uses: 4

Interact With This Article

Here are some suggestions for what to do next.

Start Reading

PDF Version Also Available for Download.

Citations, Rights, Re-Use

Jones, E. & Sicherman, A. Evaluating and managing the integrity of computerized accountability systems against insider threats, article, June 1, 1996; California. (digital.library.unt.edu/ark:/67531/metadc687115/: accessed August 17, 2017), University of North Texas Libraries, Digital Library, digital.library.unt.edu; crediting UNT Libraries Government Documents Department.