PROTECTION OF DATA IN COMPUTERIZED NUCLEAR MATERIALS ACCOUNTANCY

Year
1989
Author(s)
Riley D. Carver - Lawrence Livermore National Laboratory
Riley D. Carver - Lawrence Livermore National Laboratory
Riley D. Carver - Lawrence Livermore National Laboratory
Riley D. Carver - Lawrence Livermore National Laboratory
Riley D. Carver - Lawrence Livermore National Laboratory
Riley D. Carver - Lawrence Livermore National Laboratory
Riley D. Carver - Lawrence Livermore National Laboratory
Riley D. Carver - Lawrence Livermore National Laboratory
John E. Mead - Lawrence Livermore National Laboratory
John E. Mead - Lawrence Livermore National Laboratory
John E. Mead - Lawrence Livermore National Laboratory
John E. Mead - Lawrence Livermore National Laboratory
John E. Mead - Lawrence Livermore National Laboratory
John E. Mead - Lawrence Livermore National Laboratory
John E. Mead - Lawrence Livermore National Laboratory
Judy J. Woo - Lawrence Livermore National Laboratory
Judy J. Woo - Lawrence Livermore National Laboratory
Judy J. Woo - Lawrence Livermore National Laboratory
Judy J. Woo - Lawrence Livermore National Laboratory
Judy J. Woo - Lawrence Livermore National Laboratory
Judy J. Woo - Lawrence Livermore National Laboratory
Judy J. Woo - Lawrence Livermore National Laboratory
Abstract
Most of us are very aware of the exacting procedures used to safeguard nuclear materials. The accountancy data and the associated hardware involved must also be protected. A computer systerm manager must employ many different techniques to accomplish an adequate level of protection for the data and equipment. Separation of duties minimizes opportunity for unauthorized transactions. Limited privilege permits only approved personnel to alter or even view the data. Restricted access discourages casual traffic around the hardware. Archiving helps recovery after any unexpected disaster. Redundancy complements archiving and also provides an audit trail to track timeliness and history. Some of these techniques are provided as part of the computer operating system. Others must be programmed for the specific needs of the