What people are saying - Write a review
We haven't found any reviews in the usual places.
The Security Role of Components of Computer Configurations
10 other sections not shown
Other editions - View all
access control access matrix accidental annual loss expectancy application program application software areas audit authentication authorised backup based information systems chapter ciphertext complete computer based information computer centre computer installation computer security computer system confidential contingency plan cost cryptography data held Data integrity data processing Data Protection Act data subject deliberate detect device Discuss effective employees encryption ensure entry environment errors example figure files fire hardware identify implementation incidents individual inference controls input interface login logs loss manual memory methodology methods microcomputers monitoring objects online systems operating system organisation output password patent personal data personnel physical security plaintext privilege problems procedures proprietary software query set recovery requirements responsibility risk analysis scenario analysis security breach security countermeasures security programme security safeguards sensitive staff subsystem system software systems analyst technical terminal threat unauthorised United Kingdom vulnerabilities