NCJ Number
102423
Date Published
1986
Length
292 pages
Annotation
This comprehensive guide to preventing unauthorized access to computer systems focuses on six key areas: determining access control needs, establishing a security policy, selecting the appropriate tools and technology, designing a secure system, implementing and monitoring that system, and responding to change.
Abstract
The book covers a wide range of topics from identifying potential weaknesses in data communications networks to ensuring that security controls are not circumvented, from creating a system for user clearance and data classification to balancing operations and productivity with security and control. Subjects examined in depth include closed and limited-access networks, office automation systems, personal computer protection, security monitoring and feedback, access control software, and database security. Among the contemporary issues discussed are trends in computer fraud and industrial espionage, software piracy, automation of information security policies, personal identification devices, and ways to cope with advancing technology. Numerous examples, charts, and graphs. (Publisher abstract modified)