Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Source code security: checklist for managers

Source code security: checklist for managers Although computer security is usually thought of as data security, the protection of the executable software which creates and maintains that data is an equally important aspect of security. This article will describe the general principles for securing source code integrity in the computer services department of a medium to large size organization. It is addressed to the EDP manager, auditor, or user who has primary administrative, rather than technical, responsibility for the security of such code. My treatment of these issues will inevitably reflect my own primary experience of them, which has been with mainframe batch data processing applications. But the underlying principles of source code security are the same for all types of software, whether batch, interactive, or micro. Accordingly, I may hope that my discussion of these problems will be of some use also to those who must manage other types of data processing. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

Source code security: checklist for managers

ACM SIGSAC Review , Volume 5 (2) – Mar 1, 1987

Loading next page...
 
/lp/association-for-computing-machinery/source-code-security-checklist-for-managers-zCXD17MdsN

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 1987 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/27944.27947
Publisher site
See Article on Publisher Site

Abstract

Although computer security is usually thought of as data security, the protection of the executable software which creates and maintains that data is an equally important aspect of security. This article will describe the general principles for securing source code integrity in the computer services department of a medium to large size organization. It is addressed to the EDP manager, auditor, or user who has primary administrative, rather than technical, responsibility for the security of such code. My treatment of these issues will inevitably reflect my own primary experience of them, which has been with mainframe batch data processing applications. But the underlying principles of source code security are the same for all types of software, whether batch, interactive, or micro. Accordingly, I may hope that my discussion of these problems will be of some use also to those who must manage other types of data processing.

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Mar 1, 1987

There are no references for this article.