What people are saying - Write a review
We haven't found any reviews in the usual places.
INFORMATION MANAGEMENT RESOURCES
Part Four INFORMATION INTEGRITY MANAGEMENT
1O DISASTER PREPAREDNESS AND RECOVERY
6 other sections not shown
access privileges activity addition algorithms alteration and/or application programs application software appropriate associated audit automated resources backup resources backup site capable components compromise events compromise potential configuration cost data communications database processing deliberate compromise directory function disaster disk disk packs distributed documentation employee encryption devices enterprise equipment evaluated execution existing facility Figure files frequency Hand geometry identification parameters identified impact information integrity information management resources information processing initial installations integrity levels involved Link encryption logical integrity measures magnetic tape maintained maintenance major manual mation occur on-line operating systems outage output parameters passwords personal identification personnel physical access control physical and logical procedures programs processors produced recovery plan recovery procedures relative relay node requests resource center result retrieval risk selected sensitive source/destination storage areas subset systems and applications tape task team terminal devices tion traffic unauthorized update user community utilization vendor