What people are saying - Write a review
We haven't found any reviews in the usual places.
Part Two THE INFORMATION MANAGEMENT ENVIRONMENT
Part Three INFORMATION INTEGRITY DEFINITIONS
COMPROMISE OF INFORMATION INTEGRITY
7 other sections not shown
acceptable activity addition algorithms alteration and/or application software associated audit automated resources backup resources backup site capability components compromise events compromise potential configuration cost critical data communications Database management systems database processing deliberate compromise directory function disk disk packs distributed documentation employee encryption devices enterprise equipment evaluated execution existing facility Figure files frequency identification parameters identified impact information integrity information management resources information processing initial installation integrity levels involved Link encryption logical integrity measures loss magnetic tape maintained maintenance major manual material mation minimize network processing function occur off-site backup on-line operating systems outage parameters passwords personal identification personnel physical access control physical and logical procedures programs processors produced recovery plan recovery procedures relative relay node resource center result retrieval risk selected sensitive storage areas subset systems and applications tape task team terminal devices testing three functions tion transition utilization vendor