Browse content
Table of contents
Actions for selected chapters
- Full text access
- Book chapterAbstract only
CHAPTER 1 - OVERVIEW
Pages 1-7 - Book chapterAbstract only
CHAPTER 2 - THE ASSESSMENT
Pages 9-15 - Book chapterAbstract only
CHAPTER 3 - PHYSICAL ASPECTS
Pages 17-25 - Book chapterAbstract only
CHAPTER 4 - MAGNETIC VOLUME CONTROL
Pages 27-35 - Book chapterAbstract only
CHAPTER 5 - SYSTEM SECURITY
Pages 37-52 - Book chapterAbstract only
CHAPTER 6 - BACKUP PROCEDURE
Pages 53-59 - Book chapterAbstract only
CHAPTER 7 - CONTROL ASPECTS AND BUSINESS CONSIDERATIONS
Pages 61-71 - Book chapterNo access
APPENDIX I - CLASSROOM QUESTIONS
Pages 73-76 - Book chapterNo access
APPENDIX II - SAMPLE FORMALIZED DP SECURITY ASSESSMENT
Pages 77-80 - Book chapterNo access
APPENDIX III - A TYPICAL DATA PROCESSING INSURANCE POLICY
Pages 81-99 - Book chapterNo access
BIBLIOGRAPHY
Page 100 - Book chapterNo access
INDEX
Pages 101-103
About the book
Description
The Data Processing Security Game: Safeguarding against the Real Dangers of Computer Abuse aims to propose the fundamental elements required to insure satisfactory data processing (DP) security levels in a business setting. This text first presents the basic philosophical points regarding DP security game and the organization of this book. This selection then gives an assessment or self-evaluation of the DP environment, which is followed by a discussion on the basic areas of physical security to be considered. A significant area in the DP security game, which is magnetic volume control, is then discussed. This book then explains system security, backup procedure, control aspects, and business considerations. This selection will be very invaluable to those wanting to explore data processing security and apply it to a business environment.
The Data Processing Security Game: Safeguarding against the Real Dangers of Computer Abuse aims to propose the fundamental elements required to insure satisfactory data processing (DP) security levels in a business setting. This text first presents the basic philosophical points regarding DP security game and the organization of this book. This selection then gives an assessment or self-evaluation of the DP environment, which is followed by a discussion on the basic areas of physical security to be considered. A significant area in the DP security game, which is magnetic volume control, is then discussed. This book then explains system security, backup procedure, control aspects, and business considerations. This selection will be very invaluable to those wanting to explore data processing security and apply it to a business environment.
Details
ISBN
978-0-08-021790-1
Language
English
Published
1977
Copyright
Copyright © 1977 Elsevier Inc. All rights reserved.
Imprint
Pergamon