1. 1 Background
In recent years the Air Force has become increasingly aware of the problem of
computer security. This problem has intruded upon virtually every aspect of USAF
operations and administration. The problem arises from a combination of factors
that includes: greater reliance on the computer as a data processing and decision
making tool in sensitive functional areas; the need to realize economies by consolidating
ADP resources thereby integrating or co-locating previously separate data
processing operations; the emergence of complex resource sharing computer systems
providing users with capabilities for sharing data and processes with other users;
the extension of resource sharing concepts to networks of computers; and the slowly
growing recognition of security inadequacies of currently available computer systems.
Most of the efforts to date to provide computer security have been centered in environments
where all persons coming in contact with the system share a common clearance
and where the principal effort has been directed to providing procedural controls,
especially those associated with extc .al access to the computer systems and their
files, and proper marking of information found in the system.