Personnel Security

  • John M. D. Hunter
Part of the Computer Communications and Networks book series (CCN)


The principles of personnel security with computer systems do not differ from those with any other sort of system. However, the high technology aspects of computer systems can make the problem worse than with conventional systems. Visitors attracted to a computer system because of the novelty value of a computer should rapidly disappear as a problem. Even so, it is wise to view all visitors with cynical suspicion: do not allow them to “have a go” on an operational system and, if possible, try to avoid allowing them to touch or handle any of the operational equipment — no matter how important they may seem to be!


Security Policy Security Breach Personnel Security Good Security Security Specialist 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag London 2001

Authors and Affiliations

  • John M. D. Hunter
    • 1
  1. 1.CISM GroupCranfield University, RMCSShrivenham, SwindonUK

Personalised recommendations