Computers - Crimes, Clues and Controls: A Management Guide

Front Cover
DIANE Publishing, 1993 - 52 pages
Discusses how to prevent computer crime, particularly computer-related waste and abuse caused unintentionally as a result of not knowing how to safeguard information resources. Explains controls and techniques to prevent computer information loss. Drawings.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Selected pages

Common terms and phrases

Popular passages

Page 9 - Sensitive application" is a computer application which requires a degree of protection because it processes sensitive data or because of the risk and magnitude of loss or harm that could result from improper operation or deliberate manipulation of the application (eg, automated decisionmaking systems). e. "Sensitive data...
Page 37 - Periodic Risk Analysis. Agencies shall establish and maintain a program for the conduct of periodic risk analyses at each installation to ensure that appropriate, cost effective safeguards are incorporated into existing and new installations. The objective of a risk analysis is to provide a measure of the relative vulnerabilities and threats to an installation so that security resources can be effectively distributed to minimize potential loss. Risk analyses may vary from an informal review of a...
Page 1 - Establish systems of management control that document the requirements that each major information system is intended to serve; and provide for periodic review of those requirements over the life of the system in order to determine whether the requirements continue to exist and the system (3) Make the official whose program an information system supports responsible and accountable for the products of that system...
Page 29 - mirroring"). The frequency of the backups can be daily, weekly, or monthly. The backup retention cycle could be defined as daily backups kept for a week, weekly backups kept for a month, or monthly backups kept for a year. Contingency planning consists of workable procedures for continuing to perform essential functions in the event that information technology support is interrupted. Application plans should be coordinated with the backup and recovery plans of any installations and networks used...

Bibliographic information