Abstract
After the application software has been developed and has satisfied acceptance tests, it forms part of the information system and the system enters the operational stage. During the operational stage, security must not be allowed to deteriorate, otherwise the effort expended in building controls into the application software will have been wasted. The work of the operations section is of major importance and must be reliable. A number of procedures can be used to complement the controls that are in and around the application software (IBM, 1976). The operational aspects which affect security include company policies relating to access to computing facilities; commitment and involvement of operations personnel; recovery planning; and maintenance of software and hardware. There are many other aspects of security that are conducive to secure operations. These include data security, physical security and contingency planning. These are described in other chapters, with which there is some inevitable overlap. The topics in this chapter are presented from the operations point of view.
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Copyright information
© 1985 V. P. Lane
About this chapter
Cite this chapter
Lane, V.P. (1985). Security Aspects of the Operation of Computer Facilities. In: Security of Computer Based Information Systems. Macmillan Computer Science Series. Palgrave, London. https://doi.org/10.1007/978-1-349-18011-0_7
Download citation
DOI: https://doi.org/10.1007/978-1-349-18011-0_7
Publisher Name: Palgrave, London
Print ISBN: 978-0-333-36437-6
Online ISBN: 978-1-349-18011-0
eBook Packages: Computer ScienceComputer Science (R0)