Abstract

Control methods for data security are discussed in the previous chapter. They are access control, information control, inference control and cryptography. In this chapter hardware, system software, communications and terminals are considered to show how the four data security control methods are implemented in computer configuration components. Online systems depend for their security on good application software — the design of application software is considered in chapter 6 — but in addition application software for online systems, like other application software, requires a secure environment in which to operate.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.