Outlines the configuration of a typical remote-access, multi-user resource-sharing computer system and identifies some of its vulnerabilities to unauthorized divulgence of information. In military terms, this is the computer security problem; in civilian terms, the computer privacy problem. The latter is less clearly structured from both legal and practical viewpoints. There are vulnerabilities of personnel, hardware, software, and especially communications. Eavesdropping, wiretapping, copying, or outright theft of files are possible. Could reasons of national interest lead the professional intelligence effort of a foreign government to focus on a computer network? This paper presents terminology, outlines the problem, and suggests design considerations; detailed technological countermeasures are given in P-3504, [System Implications of Information Privacy]. (Presented at the Spring Joint Computer Conference, Atlantic City, April 17-19, 1967.) 32 pp.
Ware, Willis H., Security and Privacy in Computer Systems.. Santa Monica, CA: RAND Corporation, 1967. https://www.rand.org/pubs/papers/P3544.html. Also available in print form.
Ware, Willis H., Security and Privacy in Computer Systems., Santa Monica, Calif.: RAND Corporation, P-3544, 1967. As of October 06, 2021: https://www.rand.org/pubs/papers/P3544.html