This publication provides a guideline to be used by Federal organizations in the selection and evaluation of techniques for automatically verifying the identity of individuals seeking access to computer systems and networks via terminals, where controlled acceddibility is required for security purposes. The guideline describes various techniques for verifying identity and provides a set criteria for the evaluation of automated identification systems embodying techniques.
This publication provides guidelines for use by Federal ADP organizations in implementing the computer security safeguards necessary for compliance with Public Law 93-579, the Privacy Act of 1974. A wide variety of technical and related procedural safeguards are described. These fall into three broad categories: Physical security, information management practices, and computer system/network security controls. As each organization processing personal data has unique characteristics, specific organizations should draw upon the material provided in order to select a well-balanced combination of safeguards which meets their particular requirements.
This publication provides guidelines to be used by Federal organizations in structuring physical security programs for their ADP facilities. It treats security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site Facilities, contigency plans, security awareness and security audit. It contains statistics and information relevant to physical security of computer data and facilites and references many applicable publications for a more exhaustive treatment of specific subjects.