Security standards for data processing
Risk/cost/benefit analysis; The security officer; Getting help with security problems; Personnel; The structure of the installation; Access control; System checks and control; File control.
What people are saying - Write a review
We haven't found any reviews in the usual places.
s RiskCostBenefit Analysis
The Security Officer
6 The Structure of the Installation
1 other sections not shown
Other editions - View all
access control air conditioning alarm analysis Appendix back-up bomb building cards cedures chapter check digit checklist computer area computer files computer installation computer operators computer room computer security computer system consultancy Continuous stationery copies cost damage data control department data preparation depend detection discussed doors edit program effective employee enforcement ensure equipment errors example existing extinguishing fall-back system file library fire fire-resistant fraud Halon hardware high security input key punching librarian locked loss machine magnetic tape manual master file ment method on-line system operating system operational programs output paper tape passwords person personnel possible precautions prevention printed protection punched punched cards puter recommended reel responsibility risk routines Sample security officer security problems security procedures security standards staff stored tape library tapes and disks terminal tion top secret transaction types unauthorized update