Information risk assessment, risk analysis and risk management: The IRR research model
โ Scribed by Karin Badenhorst; Jan Eloff
- Publisher
- Elsevier Science
- Year
- 1992
- Weight
- 685 KB
- Volume
- 1992
- Category
- Article
- ISSN
- 0960-2593
No coin nor oath required. For personal study only.
โฆ Synopsis
the person who inputs data; the person who handles amendments; the person who checks the input; the person who checks that output and the person who authorizes payment --is the same individual! It is sometimes difficult with present-day staffing constraints to separate functions out fully but the principles should be adhered to as far as possible.
PC systems are often said to be more vulnerable than mainframe systems, they need not be. Given a commonsense attitude and application of the basic security and audit principles a PC system should be soundly protected from most threats.
Andrew Hiles is chairman of Survive! the user group for IT contingency planning professionals and an international consultant on IT security and services. He is also chairman of EURIM, a newly established working group concerned with European IT legislation.
๐ SIMILAR VOLUMES
There is an increasing awareness among environmental professionals and public that a totally risk free environment is an unattainable goal, and that the development of eective risk management strategies, involving a wide variety of scientiยฎc and societal considerations, is needed. The Department of
This Book Integrates Landscape Ecology, Environmental Risk Assessment, Valuation Of Ecological Goods And Services, And Environmental Management Decision Processes Into One Single Source. It Covers Marine, Forest, Agricultural, And Pharmaceutical Risk Assessment. With Material That Is Accessible Acro