The Data Processing Security Game
Safeguarding Against the Real Dangers of Computer Abuse
- 112 pages
- English
- PDF
- Only available on web
The Data Processing Security Game
Safeguarding Against the Real Dangers of Computer Abuse
About This Book
The Data Processing Security Game: Safeguarding against the Real Dangers of Computer Abuse aims to propose the fundamental elements required to insure satisfactory data processing (DP) security levels in a business setting. This text first presents the basic philosophical points regarding DP security game and the organization of this book. This selection then gives an assessment or self-evaluation of the DP environment, which is followed by a discussion on the basic areas of physical security to be considered. A significant area in the DP security game, which is magnetic volume control, is then discussed. This book then explains system security, backup procedure, control aspects, and business considerations. This selection will be very invaluable to those wanting to explore data processing security and apply it to a business environment.
Frequently asked questions
Information
Table of contents
- Front Cover
- The Data Processing Security Game: Safeguarding Against the Real Dangers of Computer Abuse
- Copyright Page
- Table of Contents
- TO MECHTHILD
- OTHER PERGAMON TITLES OF INTEREST
- PREFACE
- CHAPTER 1. OVERVIEW
- CHAPTER 2. THE ASSESSMENT
- CHAPTER 3. PHYSICAL ASPECTS
- CHAPTER 4. MAGNETIC VOLUME CONTROL
- CHAPTER 5. SYSTEM SECURITY
- CHAPTER 6. BACKUP PROCEDURE
- CHAPTER 7. CONTROL ASPECTS AND BUSINESS CONSIDERATIONS
- APPENDIX I: CLASSROOM QUESTIONS
- APPENDIX II: SAMPLE FORMALIZED DP SECURITY ASSESSMENT
- APPENDIX III: A TYPICAL DATA PROCESSING INSURANCE POLICY
- BIBLIOGRAPHY
- INDEX