Information security and data protection
by Anique A. Qureshi, Joel G. Siegel
International Journal of Computer Applications in Technology (IJCAT), Vol. 14, No. 1/2/3, 2001

Abstract: The use of the Internet and networked computers has changed the computing environment significantly. While providing convenience, the systems are also more vulnerable to security threats. This article discusses actions that may be taken to enhance security. A comprehensive analysis should be conducted to identify resources that need to be protected. The resources should be classified according to the sensitivity level of information. A cost-benefit analysis should be performed to determine the level of security precautions that should be given to contingency planning and recovery. If security is compromised, the organisation should be able to recover quickly and minimise damages.

Online publication date: Tue, 15-Jul-2003

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Computer Applications in Technology (IJCAT):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com