Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

The place of computer security in the business




TEXT 1B.

 

Computer security is often seen as, and introduced as, a separate measure. Frequently the approach to computer security bears little relationship to the approach to security that may exist elsewhere in the organization.

Security should be applied as a consistent company policy which includes all business functions, as well as functions carried out on computer systems. Computer security should be an integral part of any organization’s approach to security.

Computer systems small and large, generally provide support to a business function which will have its own aims and strategy. Responsibility for the business functions lies with senior executives (usually), and the task of assuring the security and credibility of the business function is usually included in this responsibility. As business functions become increasingly dependent on small computer systems, the responsibility for their security should be recognized.

Frequently security is managed from too far down in the organization. The authority needed to induce a positive security commitment is therefore lacking. Security officers frequently do not have the authority to develop an effective policy, let alone implement and control it.

Security should be managed from a senior position in the organization, so that the security approach adopted can be evenly applied across the organization. Computer security can then be managed in this organizational context.

If you are not satisfied with your company’s general approach, seek first to introduce a security culture to provide the necessary context for computer security. This means devising and mounting a specific program for ensuring that the people concerned are aware of, and observe these new responsibilities.

Personnel faced with new security related tasks which at first sight seem more trouble than they are worth, will respond more positively if the new responsibilities are fully explained in terms of the organization’s business and security objectives. In effect, the end-user must be sold the benefits of security.

 

TEXT 1C.

ACCURACY OF SOFTWARE AND DATA.

 

It has long been recognized that the accuracy of software and data is critical in almost all phases of data processing. In most organizations information produced on large mainframe computer systems and the software used to handle such information has been subjected to extensive critical review and error-checking, both during system development and during normal processing.

This has enabled confidence to be placed in the quality of resulting information and other “products” of computer systems.

Smaller computers have made powerful computational and analytical tools available to users throughout many organizations. Increasingly important decisions are being made based on information processed by such systems. Unfortunately, there may be a reluctance to apply the same degree of care (and cost) in integrity assurance as is routinely applied for larger systems. Nevertheless, the formal and official appearance of printed materials which can be produced easily by even microcomputers can result in unwarranted confidence in the substance of such materials.




Поделиться с друзьями:


Дата добавления: 2015-03-29; Просмотров: 467; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.009 сек.