Abstract: CONTENTS INCLUDE: Planning and Budgeting. - How many information security staff should you have? - Planning as a means to achieve appropriate data communications security - A context for information systems security planning Organizational Politics. - Using information security to achieve competitive advantage - Management success factors - Establishing internal technical systems security standards - Policies for detecting computer abuse - Enhancing information security with the Irm approach - Fifteen major forces driving the civilian information security market - Policies for detering computer abuse Designing Secure Systems. - An overview of information security products and services - Principles of secure information systems design - Extended user authentication - Effective information system security with password controls - Administrative controls for password-based computer access control systems - Micro computer and floppy diskette computer security measures
Publication Year: 1991
Publication Date: 1991-01-01
Language: en
Type: book
Access and Citation
Cited By Count: 13
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot