next up previous
Next: 2.2.2 The risks Up: 2.2 Local Computing Environment Previous: 2.2 Local Computing Environment

2.2.1 Introduction

Adequately secure systems deter, prevent, or detect unauthorized disclosure, modification, or use of information. Company information requires protection from intruders, as well as from employees with authorized computer access privileges who attempt to perform unauthorized actions. Protection is achieved not only by technical, physical and personnel safeguards, but also by clearly articulating and implementing company policy regarding authorized system use to information users and processing personnel at all levels.



Denis Arnaud
12/19/1997