Role of Management and Policy Issues in Computer Security: Rand Report R-609 within Organization

Authors

  • Jamal Boujmil RS&GIS Lab. Dept. Telecommunications The National School for Applied Sciences of Tetuan, Tetuan, Morocco
  • N. Tagmouti RS&GIS Lab. Dept. Telecommunications The National School for Applied Sciences of Tetuan Tetuan, Morocco
  • N. Raissouni RS&GIS Lab. Dept. Telecommunications The National School for Applied Sciences of Tetuan Tetuan, Morocco

DOI:

https://doi.org/10.14738/tmlai.54.3209

Keywords:

Information Systems, Information Security, R-609

Abstract

The need to provide strengthened Security for Information Systems within organization increases day after day seeing the large development of interconnection of the World Wide Web and the clear effect that results by the frequent and multiple productions of attacks and threats. This feebleness and gap in current information technologies urge researcher to face by developing more secure systems of Sharing Resources. The history of securing Information Systems began with the concept of Computer Security in its Global meaning Physical and Non-Physical. Thus, by 1967 the Department of Defense of USA published the R-609 which is considered as the first step in the wide world of Information security including Securing the data, Limiting random and unauthorized access to that data and Involving personnel from multiple levels of the organization in information security. The purpose of this paper is to analyze and evaluate the role of management and policy issues in computer security that proposes Rand Report R-609 within organization.

 

References

(1) Willis Ware. “Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security.” Published for the Office of the Secretary of Defense Edited by Willis H. Ware. R-609-1. Reissued October 1979.

(2) Roberts, Larry. “Program Plan for the ARPANET.” 8 February 2007 www.ziplink.net/~lroberts/SIGCOMM99_files/frame.htm.

(3) Schell, Roger R., Downey, Peter J., and Popek, Gerald J. Preliminary Notes on theDesign of Secure Military Computer System. January 1973. File, MCI-73-1, ESD/AFSC, Hanscom AFB, Bedford, MA 01731.

(4) Bisbey, Richard, Jr., and Hollingsworth, Dennis. Protection Analysis: Final Report.May 1978. Final report, ISI/SR-78-13, USC/Information Sciences Institute, Marina DelRey, CA 90291.

(5) Grampp, F. T., and Morris, R. H. “UNIX Operating System Security.” AT&T BellLaboratories Technical Journal 63, no. 8 (1984): 1649–1672.

(6) Peter Salus. “Net Insecurity: Then and Now (1969–1998).” Sane ‘98 Online. 19November 1998. Accessed 26 March 2007 from www.nluug.nl/events/sane98/after-math/salus.html.

Downloads

Published

2017-09-01

How to Cite

Boujmil, J., Tagmouti, N., & Raissouni, N. (2017). Role of Management and Policy Issues in Computer Security: Rand Report R-609 within Organization. Transactions on Engineering and Computing Sciences, 5(4). https://doi.org/10.14738/tmlai.54.3209

Issue

Section

Special Issue : 1st International Conference on Affective computing, Machine Learning and Intelligent Systems