Authors: Anique A. Qureshi, Joel G. Siegel
Addresses: Queens College, CUNY, USA. Queens College, CUNY, USA
Abstract: The use of the Internet and networked computers has changed the computing environment significantly. While providing convenience, the systems are also more vulnerable to security threats. This article discusses actions that may be taken to enhance security. A comprehensive analysis should be conducted to identify resources that need to be protected. The resources should be classified according to the sensitivity level of information. A cost-benefit analysis should be performed to determine the level of security precautions that should be given to contingency planning and recovery. If security is compromised, the organisation should be able to recover quickly and minimise damages.
Keywords: computer security; data security; information security; network security; contingency planning; risk analysis; data backup; data recovery; security policy; audit trail.
International Journal of Computer Applications in Technology, 2001 Vol.14 No.1/2/3, pp.1-16
Published online: 15 Jul 2003 *Full-text access for editors Access for subscribers Purchase this article Comment on this article