Audit and Control of Computer NetworksMany companies are now almost totally dependent upon their communications networks to meet their business objectives. It is essential in such circumstances that the data transmitted over the networks is both protected from unauthorised users and available to authorised personnel when required. |
Contents
Acknowledgements | 11 |
OverviewNetwork Control and Security | 21 |
Features of Logical Access Control | 37 |
Copyright | |
8 other sections not shown
Common terms and phrases
access control system access permissions allocation allow application systems authorised users back-up batch totals British Telecom central computer centralised check digit cipher text circuit communications networks companies computer file computer installation computer room computer security computer systems contingency plans control access control account controls over access data communications datascopes decryption device Dial-back distributed system eavesdropping encryption algorithm ensure equipment error example facilities faults functions hacker hacking id and password identifier individual users input logical access control mainframe minicomputer modems modes of operation monitoring NCC Publications network control section network user on-line on-line systems operating system organisation Packet SwitchStream password password change plain text problem procedures processor programs protection record risk sign-on specific standard user ids switching system administrator tape telephone number terminal threat tion transaction processing transmitted unauthorised access update user id viewdata Whilst