Except where security has been very obviously of major importance it has, in the past, often been largely ignored by designers of computer systems. This situation is rapidly changing, but a great deal still needs to be done to establish recognized codes of good practice. This publication lists threats to computer systems and suggests possible safeguards. It is intended to give initial guidance to those concerned with securing their own installations. The book provides a review of security techniques, putting each one into broad categories of cost and effectiveness. The range of such techniques covers not only the functions of computer operating systems and hardware but also personnel management problems and physical security. A cost-effectiveness matrix in the appendix highlights the effects of various security techniques as applied to different types of risks with negligible, low or high cost.

  • Corporate Authors:

    National Computing Centre, Limited

    Quay House, Quay Street
    Manchester Mc 3HU,   England 
  • Authors:
    • Farr, MAL
    • Chadwick, B
    • Wong, K K
  • Publication Date: 1972

Media Info

  • Pagination: 172 p.

Subject/Index Terms

Filing Info

  • Accession Number: 00051921
  • Record Type: Publication
  • Source Agency: British Railways
  • Report/Paper Numbers: Book
  • Files: TRIS
  • Created Date: Apr 26 1976 12:00AM