We have seen that the key elements in achieving information security involve the detection of threats, reduction in vulnerability to such threats (see chapter 2), and the ability to recover in the event of an impact. The controls and procedures that form part of a security programme should ideally have been established through the process of risk analysis.
KeywordsAccess Control Information Security Access Privilege Computer Virus Physical Security
Unable to display preview. Download preview PDF.
- Broadbent, D., Contingency Planning (NCC Publications, 1979)Google Scholar
- Hearnden, K., A Handbook of Computer Security (Kogan Page, 1987)Google Scholar
- Hutt, A.E., Bosworth, S., Hoyt, D.B., Computer Security Handbook (Macmillan, 1988)Google Scholar
- Lobel, J., Foiling the System Breakers (McGraw-Hill Book Company, 1986)Google Scholar
- Wood, Michael B., Computer Access Control (NCC Publications, 1985)Google Scholar
- Wood, Michael B., Introducing Computer Security (NCC Publications, 1982)Google Scholar
- Wood, Michael B., Physical Computer Security (NCC Publications, 1986).Google Scholar