First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.
Table of Contents
1. An Organisation for Security in a Major Company. Charles Brookson. 2. Information Technology Security Evaluation: Management Summary. Eric Roche. 3. Closing the Evaluation Gap – the CLEF Experience. Andrew Clark and Andrea Cumming. 4. Mechanisms of Stealth. Alan Solomon. 5. Computer Viruses. Jan Hruska. 6. Security Modelling. John Gordon. 7. Secure Delivery of Software. Fiona Williams and Samantha Green. 8. Digital Signatures for Non-Repudiation. Fred Piper. 9. Network Encryption Management. Vince Gallo. 10. Computer Crime: Law and Regulation – Protection and Prosecution. Wendy R. London. 11. A Structured Control Methodology to Aid Data Security. John Mitchell. 12. Securing Your PC. Alex Mcintosh.