Abstract
Control methods for data security are discussed in the previous chapter. They are access control, information control, inference control and cryptography. In this chapter hardware, system software, communications and terminals are considered to show how the four data security control methods are implemented in computer configuration components. Online systems depend for their security on good application software — the design of application software is considered in chapter 6 — but in addition application software for online systems, like other application software, requires a secure environment in which to operate.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.