The principles of personnel security with computer systems do not differ from those with any other sort of system. However, the high technology aspects of computer systems can make the problem worse than with conventional systems. Visitors attracted to a computer system because of the novelty value of a computer should rapidly disappear as a problem. Even so, it is wise to view all visitors with cynical suspicion: do not allow them to “have a go” on an operational system and, if possible, try to avoid allowing them to touch or handle any of the operational equipment — no matter how important they may seem to be!
KeywordsSecurity Policy Security Breach Personnel Security Good Security Security Specialist
Unable to display preview. Download preview PDF.