Advertisement

Conclusions

  • John M. D. Hunter
Part of the Computer Communications and Networks book series (CCN)

Abstract

In the introduction to this book, it was stated that the aim of this book was to provide answers to five questions:
  • What is security?

  • What are the security problems particular to an IT system?

  • What can be done to reduce the security risks associated with such a system?

  • In a given situation, what are the appropriate security countermeasures?

  • How should one set about procuring an information system with security implications?

Keywords

Information Security Security Measure Security Risk Security Problem Personnel Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag London 2001

Authors and Affiliations

  • John M. D. Hunter
    • 1
  1. 1.CISM GroupCranfield University, RMCSShrivenham, SwindonUK

Personalised recommendations