Skip to main content

Security Aspects of the Operation of Computer Facilities

  • Chapter
Security of Computer Based Information Systems

Part of the book series: Macmillan Computer Science Series

  • 19 Accesses

Abstract

After the application software has been developed and has satisfied acceptance tests, it forms part of the information system and the system enters the operational stage. During the operational stage, security must not be allowed to deteriorate, otherwise the effort expended in building controls into the application software will have been wasted. The work of the operations section is of major importance and must be reliable. A number of procedures can be used to complement the controls that are in and around the application software (IBM, 1976). The operational aspects which affect security include company policies relating to access to computing facilities; commitment and involvement of operations personnel; recovery planning; and maintenance of software and hardware. There are many other aspects of security that are conducive to secure operations. These include data security, physical security and contingency planning. These are described in other chapters, with which there is some inevitable overlap. The topics in this chapter are presented from the operations point of view.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Copyright information

© 1985 V. P. Lane

About this chapter

Cite this chapter

Lane, V.P. (1985). Security Aspects of the Operation of Computer Facilities. In: Security of Computer Based Information Systems. Macmillan Computer Science Series. Palgrave, London. https://doi.org/10.1007/978-1-349-18011-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-349-18011-0_7

  • Publisher Name: Palgrave, London

  • Print ISBN: 978-0-333-36437-6

  • Online ISBN: 978-1-349-18011-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics