What people are saying - Write a review
We haven't found any reviews in the usual places.
Methods for Maintaining Data Security
Summary of Current Practices
Assessment and Recommendations
1 other sections not shown
access control access rights ACCESSES DATA account number Accounting F assembly language billing anyway BYTES OF PROGRAM cathode ray tube checksum computer hardware computer system concurrent systems Residual core store cost Data Banks data R I Data Security Determination of capabilities Determination of file device DSPS encryption erased field file directory file names file reader program FRESS hard copy hardware header Identification g g Authentication jj P Accounting limited-access magnetic tape n o n o User options noeded for billing nono nono nono off-line storage on-line one-time passwords operating system person Personal identification Protection from concurrent Protection of Data q q Integrity considerations read-only record Residual information protection S S Identification S S Identification g g security measures security of data security officer sensitive data Separation from data storage systems Residual information time-shared transmission Types of capabilities User identification user's V T Standard response