What people are saying - Write a review
We haven't found any reviews in the usual places.
Its More Than Fighting Hackers
The Right Management Approach to Security
Find Your Weak Spots
18 other sections not shown
access control accountability activities Area of Responsibility assets Audit auditor authorized users backup badge Baseline cess communication Computer center computer crime computer network computer operating computer programs computer security computer system Control Area control techniques Control Title Cost criminal Data Encryption Standard data key data processing decryption Detection device dial-up access digital signature disaster documentation electronic employees encrypted environment equipment error example facilities functions host iden identified interchange key least privilege logs loss Manual procedures 11 Medium 13 ment methods microcomputer Mode Objective operating system organization personal computers physical security Prevention 9 Principles of Note production protect puter records recovery requirements risk security system sensitive separation of duties signature specific storage tape terminal tion trol types unauthorized user's Variables vulnerable Weaknesses