Abstract
Controls have to be implemented in all stages of systems development. They are particularly critical in input design (to prevent Garbage In-Garbage Out) but such operational controls must not be unduly stressed at the cost of those in other phases of system development. This chapter begins by identifying the areas of risk using the ‘onion-skin’ approach suggested by Wong (1981), which provides a framework for systematically identifying computer-related risks (see figure 9.1). Controls to prevent and detect errors and incursions are presented in subsequent sections of the chapter.
Preview
Unable to display preview. Download preview PDF.
Further Reading
Bhaskar et al. Computer Security: Threats and Countermeasures NCC Blackwell, 1993
Chambers A. Computer Auditing Pitman, 1986
Elbra T. Guide to the Data Protection Act NCC Publications, 1984
Elbra T. A Practical Guide to the Computer Misuse Act, NCC Blackwell, 1990
Elbra T. Computer Security Handbook, NCC Blackwell, 1992
Martin J. Security, Accuracy and Privacy in Computer Systems Prentice-Hall, 1973
Norman A. Computer Insecurity, Chapman and Hall, 1983
Warner M. and Stone M. The Data Bank Society Allen and Unwin, 1970
Wong K. Computer Security: Risk Analysis and Control NCC Publications, 1977
Copyright information
© 1996 S. R. Skidmore
About this chapter
Cite this chapter
Skidmore, S. (1996). Systems Controls. In: Introducing Systems Design. Computer Science Series. Palgrave, London. https://doi.org/10.1007/978-1-349-25536-8_9
Download citation
DOI: https://doi.org/10.1007/978-1-349-25536-8_9
Publisher Name: Palgrave, London
Print ISBN: 978-0-333-72140-7
Online ISBN: 978-1-349-25536-8
eBook Packages: Computer ScienceComputer Science (R0)