Text
Computer security handbook
Contents
List of Contributors xii
Preface xxi
Introduction xxiii
Part I Management Responsibility 1
1. Chapter 1: Management’s Role in Computer Security 3
2. Chapter 2: Information Security Risk Management 22
3. Chapter 3: Employees 33
4. Chapter 4: Legal Issues in Computer Security 46
5. Chapter 5: Computer Crime and Computer Criminals 58
Part II Basic Safeguards 81
6. Chapter 6: Contingency Planning 83
7. Chapter 7: Computer Risks and Insurance 97
8. Chapter 8: Auditing in the EDP Environment 109
9. Chapter 9: System Application Controls 125
Part III Physical Protection 143
10. Chapter 10: Hardware Elements of Security 145
11. Chapter 11: Computer Facility Physical Security 166
12. Chapter 12: Monitoring and Related Control Devices 180
Part IV Technical Protection 199
13. Chapter 13: Software and Data Security 201
14. Chapter 14: Data Files 218
15. Chapter 15: Data Encryption 228
16. Chapter 16: Data Communications Networks 242
Part IV Technical Protection 259
17. Chapter 17: Forms and Related Supplies 261
18. Chapter 18: Outside Contract Sevices 272
19. Chapter 19: Security for Minicomputers and Microcomputers 285
Appendix 1: Suppliers of Security Based Risk Analysis Software 299
Appendix 2: Security Standards Manual Table of Contents (Sample) 300
Appendix 3: Confidentiality Agreement (Sample) 301
Appendix 4: Admissibility of Computer Records 302
Appendix 5: Revenue Procedure 86-19: IRS Guidelines for ADP Records 304
Appendix 6: IRS Revenue Ruling 71-20: What Are Records? 307
Appendix 7: Confidential and Proprietary Information Agreement (Sample) 308
Appendix 8: Extract from IBM License Agreement on Limitations on Use of Programs 310
Appendix 9: Employee Nondisclosure Agreement (Sample) 312
Appendix 10: State Privacy Statutes (Selected Citations) 313
Appendix 11: Crime and High Technology: A Case in Point 314
Appendix 12: Computer Abuse: Ward v. Superior Court if the State of California, County if Alameda 318
Appendix 13: Federal Information Processing Standards: Abstracts 321
Appendix 14: Comments on Copyright Infringement of Software 324
Appendix 15: FDIC Examination Questionnaire 326
Appendix 16: Work Programs for Electronic Data Processing Examinations 333
Appendix 17: Examples of Simple Cryptographic Systems 374
Appendix 18: Personal Computer Security Considerations 377
Glossary 384
Index 393
No copy data
No other version available