What people are saying - Write a review
We haven't found any reviews in the usual places.
Understanding the Need for Computer Access Control
Trends in Computer Fraud and Industrial Espionage
4 other sections not shown
abuse access control activity addition agencies analysis application approach authorized automated basic benefits called changes chapter classification communications complete compromise computer security computer system computer users concept connected considerable considered contain copy cost crime database depending devices electronic employees encryption established example experts extremely facilities Figure functions guidelines hardware host computer identification implementation important improvements increase individual information system internal laws located logical loss major mechanisms monitoring objective operating system organizations package password perform personal computer physical possible potential prevent probably problem procedures processing protection questions reasons records reference requirements responsibility result risk secret sensitive sharing solutions specifications standards system security technical terminal threats tion unauthorized access violation vulnerabilities