Skip to main content

The Security Role of Components of Computer Configurations

  • Chapter
Security of Computer Based Information Systems

Part of the book series: Macmillan Computer Science Series

  • 19 Accesses

Abstract

Control methods for data security are discussed in the previous chapter. They are access control, information control, inference control and cryptography. In this chapter hardware, system software, communications and terminals are considered to show how the four data security control methods are implemented in computer configuration components. Online systems depend for their security on good application software — the design of application software is considered in chapter 6 — but in addition application software for online systems, like other application software, requires a secure environment in which to operate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Copyright information

© 1985 V. P. Lane

About this chapter

Cite this chapter

Lane, V.P. (1985). The Security Role of Components of Computer Configurations. In: Security of Computer Based Information Systems. Macmillan Computer Science Series. Palgrave, London. https://doi.org/10.1007/978-1-349-18011-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-349-18011-0_4

  • Publisher Name: Palgrave, London

  • Print ISBN: 978-0-333-36437-6

  • Online ISBN: 978-1-349-18011-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics