Computer Security: A Comprehensive Controls Checklist
Wiley, Apr 29, 1987 - Computers - 214 pages
This checklist and discussion of security provisions in computer-based information systems contains more than 800 security-related issues in thirteen categories ranging from personnel policies and training to the protection of computer hardware and software. The discussions are based on authors' experience with sensitive resources and on the guidelines used by banking institutions.
What people are saying - Write a review
We haven't found any reviews in the usual places.
access control accounts action activities acts addressed application appropriate areas assets authorized causes changes checklist checks Code communications completed computer crime computer security computer system concern considered contained copies corrected criminal critical damage data processing databases disaster disk documents effective employees encryption entry equipment errors event example exist files fraud given identify important indicate information security information systems initial input involved laws limited lines located loss ment messages obtain operations organization output particular passwords performed periodically person prevented problem procedures production protected questions records recovery relevant Report responsible restricted result sensitive separate specific staff statute stored subsection systems security tape telecommunications terminals theft threat tion transactions types unauthorized YES NO N/A