Abstract
No information security can rely on the standard list of physical, personnel and technical security measures. Unfortunately, unless the information system is diligently administered, the quality of the system security will rapidly deteriorate. This is an inconvenient aspect of security all too often overlooked by politicians and administrators trying to cut costs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag London
About this chapter
Cite this chapter
Hunter, J.M.D. (2001). System Administration and Security. In: An Information Security Handbook. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-0261-8_14
Download citation
DOI: https://doi.org/10.1007/978-1-4471-0261-8_14
Publisher Name: Springer, London
Print ISBN: 978-1-85233-180-1
Online ISBN: 978-1-4471-0261-8
eBook Packages: Springer Book Archive