Next: 2.2.2 The risks
Up: 2.2 Local Computing Environment
Previous: 2.2 Local Computing Environment
Adequately secure systems deter, prevent, or detect unauthorized
disclosure, modification, or use of information. Company information
requires protection from intruders, as well as from employees with
authorized computer access privileges who attempt to perform
unauthorized actions. Protection is achieved not only by technical,
physical and personnel safeguards, but also by clearly articulating and
implementing company policy regarding authorized system use to
information users and processing personnel at all levels.
Denis Arnaud
12/19/1997