A practical approach to system security devices☆
References (15)
Adelman and Aple II Bust Public Crypt. Code
(Oct. 4, 1982)Central Computing Facility Passwork Management: A Status Report
(March 1981)- Computer Auditing, Coopers & Lybrand, N.Y.C., N.Y. no date...
Data Network Security: Everyones Problem
(September 1980)Data Security Through Cryptography
(October 1977)DES Modes of Operation
(December 1980)Guidelines for Implementing and Using the NBS Data Encryption Standard
(April 1981)
Cited by (1)
Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars
2014, IEEE International Symposium on Information Theory - Proceedings
- ☆
The opinions expressed in this article are those of Mr. Moulton. They are not necessarily those of the Standard Oil Company of Ohio. The material presented in this article was developed, in part, in conjuction with a publication, Handbook of Computer Security Controls: A Practical Guide, which will be published by Prentice-Hall, Inc.
- *
Rolf T. Moulton is Manager, Data Center Security for the Cleveland Data Center of the Standard Oil Company of Ohio. In this capacity, he is responsible for both data security and physical security. The responsibilities include policy and guidelines development, data access control planning and administration, EDP disruption contingency planning and administration. and physical access control. Prior to joining the Standard Oil Company, Mr. Moulton was Director of the Computer Security Services Unit of the New York City Department of Investigation where he was responsible for citywide development and enforcement of computer security policies and standards, EDP investigative auditing, and for the supervision of computer-related abuse investigations.
Mr. Moulton holds the Certificate in Data Processing (CDP) and is a certified Information Systems Auditor (CISA).