Abstract

Control methods for data security are discussed in the previous chapter. They are access control, information control, inference control and cryptography. In this chapter hardware, system software, communications and terminals are considered to show how the four data security control methods are implemented in computer configuration components. Online systems depend for their security on good application software — the design of application software is considered in chapter 6 — but in addition application software for online systems, like other application software, requires a secure environment in which to operate.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call