Security of the TACC Data Base Study (Description of Automatic Data Base Security Techniques). Volume 1
HUGHES AIRCRAFT CO FULLERTON CA GROUND SYSTEMS GROUP
Pagination or Media Count:
The report presents the results of a study which surveyed the various aspects of system security hardware, software and procedural techniques in use in current and proposed automated systems. Thirty-four systems were considered, including 20 government and 14 commercial systems. The security requirements, system environment and function, and techniques employed are described for each system. A total of 95 techniques are identified, of which 41 are software, 34 are hardware, and 20 are procedural techniques. The total number of techniques found as a result of this survey is a considerably larger number than known to exist prior to initiation of the survey. Some quantitative data detailing the relative costs involved in developing, using, and maintaining these techniques was obtained and is provided in this report. Qualitative estimates of cost are made in the remaining cases. An initial approach to categorizing systems by their security requirements and categorizing techniques by their application to security requirements was devised and applied to the raw data obtained from the survey.
- Terminal Flight Facilities
- Computer Programming and Software
- Computer Hardware
- Computer Systems Management and Standards