Practical Data Security
Seiten
1993
Avebury Technical (Verlag)
978-1-85742-145-3 (ISBN)
Avebury Technical (Verlag)
978-1-85742-145-3 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
These papers were originally presented at a seminar organized by UNICOM, and address the key points in data security. Issues covered include understanding what can go wrong and what to do about it, and the value of a risk policy and how to implement one.
The power and speed of modern IT environments is such that wiping out, disclosing or corrupting an organization's records, whether deliberately or by accident, could be efficiently and silently accomplished in a very short time. Despite being aware of this issue, most organizations do not have a policy on risk and do not undertake risk analysis and management. The chapters in this book were originally papers presented at a seminar organized by UNICOM, and addresses the key points in data security. Issues covered include understanding what can go wrong and what to do about it, learning to cut through the confusing terminology, understanding the value of a risk policy and how to implement one; understanding the relevant costs and benefits of a variety of measures such as risk analysis, awareness of programs, cryptography and access control procedures. The law itself now addresses data security directly through the recent Data Protection and Computer Misuse acts. It is important to understand their implications in order to become a beneficiary rather than a victim of this legislation.
This text is suitable for information-intensive organizations, IT specialists, data security managers, security consultants, insurance specialists, computer auditors and data processing managers.
The power and speed of modern IT environments is such that wiping out, disclosing or corrupting an organization's records, whether deliberately or by accident, could be efficiently and silently accomplished in a very short time. Despite being aware of this issue, most organizations do not have a policy on risk and do not undertake risk analysis and management. The chapters in this book were originally papers presented at a seminar organized by UNICOM, and addresses the key points in data security. Issues covered include understanding what can go wrong and what to do about it, learning to cut through the confusing terminology, understanding the value of a risk policy and how to implement one; understanding the relevant costs and benefits of a variety of measures such as risk analysis, awareness of programs, cryptography and access control procedures. The law itself now addresses data security directly through the recent Data Protection and Computer Misuse acts. It is important to understand their implications in order to become a beneficiary rather than a victim of this legislation.
This text is suitable for information-intensive organizations, IT specialists, data security managers, security consultants, insurance specialists, computer auditors and data processing managers.
Data security - an introduction, John Gordon; an oragnization for security in a major company, Charles Brookson; information technology security evaluation - management summary, Eric Roche; closing the evaluation gap - the CLEF experience, Andrew Clark and Andrea Cumming; mechanisms of stealth, Alan Solomon; computer viruses, Jan Hruska; security modelling, John Gordon; secure delivery of software, Fiona Williams and Samantha Green; digital signatures for non-repudiation, Fred Piper; network encryption management, Vince Gallo; computer crime - law and regulation - protection and prosecution, Wendy R. London; a structured control methodology to aid data security, John Mitchell; securing your PC, Alex Mcintosh.
Erscheint lt. Verlag | 1.7.1993 |
---|---|
Reihe/Serie | UNICOM Applied Information Technology S. |
Zusatzinfo | Illustrations |
Sprache | englisch |
Maße | 240 x 162 mm |
Gewicht | 370 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 1-85742-145-0 / 1857421450 |
ISBN-13 | 978-1-85742-145-3 / 9781857421453 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €