88 pages matching computer system in this book
Results 1-3 of 88
What people are saying - Write a review
We haven't found any reviews in the usual places.
The scope of computer security
Old trendsand new ones
23 other sections not shown
access control accountability activities area Computer center Area of responsibility Arpanet assets audit auditor authorized users backup badge Baseline Procedural communication computer crime computer network computer operations computer programs computer security computer system Control area Computer Cost Medium Principles criminal Data Encryption Standard data files data key database decryption detect device dial-up access digital signature disaster disk documentation effective electronic employees encryption environment equipment error example hard disk host identify Initialization Vector interchange key Large System Network logs loss Manual procedures Area methods Mode Manual procedures Objective Prevent operating system organization PC Large System personal computer physical security Prevention Control area Principles of note production protection Purpose Prevention Control puter records recovery requirements risk Selective sensitive separation of duties tape terminal tion unauthorized access user's Variables virus viruses vulnerable Weaknesses