Security for Dial Up Lines

Front Cover
DIANE Publishing, 1986 - Computers - 71 pages
Describes a set of solutions to the problem of intrusion into government and private computers via dial-up telephone lines, the so-called "hacker problem". Includes: adequate controls, common communications weaknesses, software approaches, hardware protection, "one-end" protection, "two-end" protection, and recommended courses of action. Appendices list devices presently available.

What people are saying - Write a review

We haven't found any reviews in the usual places.

Common terms and phrases

Popular passages

Page 7-29 - Security of Personal Computer Systems: A Management Guide, (NBS Special Publication 500-120, US Dept.
Page 7-27 - FIPS PUB 31, Guidelines for Automatic Data Processing Physical Security and Risk Management; (2) FIPS PUB 39, Glossary for Computers Systems Security; (3) FIPS PUB 41, Computer Security Guidelines for Implementing the Privacy Act of 1974; (4) FIPS PUB 46, Data Encryption Standard; (5) FIPS PUB 48.
Page 7-27 - FIPS PUB 31 (Guidelines for Automatic Data Processing Physical Security and Risk Management) and FIPS PUB 41 (Computer Security Guidelines for Implementing the Privacy Act of 1974) provide guidance for making such an analysis.
Page 7-27 - FIPS PUB 48. Guidelines on Evaluation of Techniques for Automated Personnel Identification; (6) FIPS PUB 65, Guideline for Automatic Data Processing Risk Analyses; (7) FIPS PUB 73. Guidelines for Security of Computer Applications...
Page 7-28 - Good Security Practices for Personal Computers." Computer Security Journal Fall/Winter (1983): 77-83. Murray, William H. "Good Security Practices for Dial-Up Systems.
Page iii - ... Integrity and Efficiency (PCIE), and contains bibliographies, and a description of pertinent laws and regulations. NBS SPEC PUB SECURITY FOR DIAL-UP LINES 500-137 By Eugene F. Troy May 1986 Ways to protect computers from intruders via dialup telephone lines are discussed in this guide. Highlighted are hardware devices which can be fitted to computers or used with their dial-up terminals to provide communications protection for non-classified computer systems. Six different types of hardware devices...
Page 7-29 - Call-Back Security System Prevents Unauthorized Computer Access," Mini-Micro Systems, July, l984, pp.
Page 7-28 - SN 003-003-01891-1 $3.00 Includes papers and summaries of presentations made at a 1977 conference on computer security. Subject areas are physical security, risk assessment, software security, computer network security, applications and implementation of the Data Encryption Standard. Considerations in the Selection of Security Measures of Automatic Data Processing Systems By Michel J.Orceyre and Robert H.
Page 6-1 - Devices in this category are called "one-end solutions", because they are used on only one end of the communications circuit between the host and terminal, but not both.

Bibliographic information