Cover for The Data Processing Security Game

The Data Processing Security Game

Safeguarding Against the Real Dangers of Computer Abuse

Book1977

Authors:

ROBERT S. BECKER

The Data Processing Security Game

Safeguarding Against the Real Dangers of Computer Abuse

Book1977

 

Cover for The Data Processing Security Game

Authors:

ROBERT S. BECKER

Browse this book

Book description

The Data Processing Security Game: Safeguarding against the Real Dangers of Computer Abuse aims to propose the fundamental elements required to insure satisfactory data processing ... read full description

Browse content

Table of contents

Actions for selected chapters

Select all / Deselect all

  1. Full text access
  2. Book chapterAbstract only

    CHAPTER 1 - OVERVIEW

    Pages 1-7

  3. Book chapterAbstract only

    CHAPTER 2 - THE ASSESSMENT

    Pages 9-15

  4. Book chapterAbstract only

    CHAPTER 3 - PHYSICAL ASPECTS

    Pages 17-25

  5. Book chapterAbstract only

    CHAPTER 4 - MAGNETIC VOLUME CONTROL

    Pages 27-35

  6. Book chapterAbstract only

    CHAPTER 5 - SYSTEM SECURITY

    Pages 37-52

  7. Book chapterAbstract only

    CHAPTER 6 - BACKUP PROCEDURE

    Pages 53-59

  8. Book chapterAbstract only

    CHAPTER 7 - CONTROL ASPECTS AND BUSINESS CONSIDERATIONS

    Pages 61-71

  9. Book chapterNo access

    APPENDIX I - CLASSROOM QUESTIONS

    Pages 73-76

  10. Book chapterNo access

    APPENDIX II - SAMPLE FORMALIZED DP SECURITY ASSESSMENT

    Pages 77-80

  11. Book chapterNo access

    APPENDIX III - A TYPICAL DATA PROCESSING INSURANCE POLICY

    Pages 81-99

  12. Book chapterNo access

    BIBLIOGRAPHY

    Page 100

  13. Book chapterNo access

    INDEX

    Pages 101-103

About the book

Description

The Data Processing Security Game: Safeguarding against the Real Dangers of Computer Abuse aims to propose the fundamental elements required to insure satisfactory data processing (DP) security levels in a business setting. This text first presents the basic philosophical points regarding DP security game and the organization of this book. This selection then gives an assessment or self-evaluation of the DP environment, which is followed by a discussion on the basic areas of physical security to be considered. A significant area in the DP security game, which is magnetic volume control, is then discussed. This book then explains system security, backup procedure, control aspects, and business considerations. This selection will be very invaluable to those wanting to explore data processing security and apply it to a business environment.

The Data Processing Security Game: Safeguarding against the Real Dangers of Computer Abuse aims to propose the fundamental elements required to insure satisfactory data processing (DP) security levels in a business setting. This text first presents the basic philosophical points regarding DP security game and the organization of this book. This selection then gives an assessment or self-evaluation of the DP environment, which is followed by a discussion on the basic areas of physical security to be considered. A significant area in the DP security game, which is magnetic volume control, is then discussed. This book then explains system security, backup procedure, control aspects, and business considerations. This selection will be very invaluable to those wanting to explore data processing security and apply it to a business environment.

Details

ISBN

978-0-08-021790-1

Language

English

Published

1977

Copyright

Copyright © 1977 Elsevier Inc. All rights reserved.

Imprint

Pergamon

You currently don’t have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.

Purchase the book

Authors

ROBERT S. BECKER

IBM General Systems Division