Security, Accuracy, and Privacy in Computer Systems
The nature of the problem; Design of the computer system; Design of physical security; Design of administrative controls; Design of the legal and social environment.
What people are saying - Write a review
DESIGN OF THE COMPUTER SYSTEM
Identifying the Machine
39 other sections not shown
Other editions - View all
accounts accuracy action agency alarm application audit authorization balance base become bits building cause Chapter characters Class Company complete consumer contain continued copy correct cost damage data banks data processing designed detect Determine discussed disk documents door effective employed employee enciphering ensure entered entry equipment error established example failure fields Figure fire give given identification important individual input installation Insured journal locked loss machine means measures methods necessary needed obtain occur officer operator period permitted person physical possible prevent probability procedures processing protection question reasonable received records referred relating responsible result sometimes specifications stored Table tape techniques terminal transaction types unit updated