What people are saying - Write a review
We haven't found any reviews in the usual places.
Threats to the Security of a Computer System
Safeguarding Computing Facilities
5 other sections not shown
accidental apply attempts audit record authentication automatically backup bits character checksum computer operators computer room computer security computer system computing facilities data preparation data reception databank designed detection devices disc documentation drum encryption enemy equipment errors executive file access control file residues fire resistant functions guard high security systems important input input/output installation Joint Computer Conference line printer low security machine magnetic card magnetic tape main memory manual audit memory protection method multi-programming executive NATIONAL COMPUTING CENTRE necessary on-line operating system organisation output paper tape passwords personnel physical access control possible prevent printouts privacy codes privileged instructions procedures read protection residue protection restrictions security controls security level security officer security parameters security sensitive specified staff standard Summary switch tape/disc teletypewriter terminal user test programs threats tion transmission trap-doors unauthorised user program user's usually vulnerable watchdog timer worthwhile write protection