Abstract
The principles of personnel security with computer systems do not differ from those with any other sort of system. However, the high technology aspects of computer systems can make the problem worse than with conventional systems. Visitors attracted to a computer system because of the novelty value of a computer should rapidly disappear as a problem. Even so, it is wise to view all visitors with cynical suspicion: do not allow them to “have a go” on an operational system and, if possible, try to avoid allowing them to touch or handle any of the operational equipment — no matter how important they may seem to be!
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag London
About this chapter
Cite this chapter
Hunter, J.M.D. (2001). Personnel Security. In: An Information Security Handbook. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-0261-8_4
Download citation
DOI: https://doi.org/10.1007/978-1-4471-0261-8_4
Publisher Name: Springer, London
Print ISBN: 978-1-85233-180-1
Online ISBN: 978-1-4471-0261-8
eBook Packages: Springer Book Archive