Audit and Control of Computer Networks
Many companies are now almost totally dependent upon their communications networks to meet their business objectives. It is essential in such circumstances that the data transmitted over the networks is both protected from unauthorised users and available to authorised personnel when required.
What people are saying - Write a review
We haven't found any reviews in the usual places.
OverviewNetwork Control and Security
Features of Logical Access Control
8 other sections not shown
access control system access permissions allocation allow authorised users back-up batch totals bits British Telecom central computer check digit cipher text circuit communications networks companies computer file computer installation computer room computer security computer systems control access control account controls over access data communications datascopes decryption detected device Dial-back distributed system eavesdropping encryption algorithm ensure equipment error example facilities faults functions hacker hacking id and password identifier individual users input logical access control mainframe minicomputer modes of operation monitoring NCC Publications network control section network user on-line systems operating system organisation Packet SwitchStream password password change plain text problem procedures processor programs protection record request risk sign-on specific standard user ids switching system administrator tape telephone number terminal threat tion transaction processing transmission transmitted unauthorised access update user id viewdata Whilst