home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Comp…er Concepts (3rd Edition) / NP3CD_Intro.iso / NP3CD / PAGE372.PAG < prev    next >
Graphics Interchange Format  |  1997-11-02  |  59KB  |  623x1043  |  8-bit (121 colors)
Labels: book | chat room | crt screen | grass | hakham | monitor | mountain | plant | road | sky | stairs
OCR: 9-16 DATA SECURITY AND CONTROL Data Security and Risk Management ata security is the collection of techniques that provide protection for data Sometimes computer user cite Jeff Richards' Laws of Data Security as tonque- -in- -cheek advice on how to attain foolproof security 1.Don't buy computer Ifvou buy computer don't turn it on. InfoWeb Richards' Laws emphasize the point that it is not practical to totally prote ct computer data from theft viruses, pue natural disasters. In most situa ations, providing total security too time- consuming too expensive or too complex For example r you are using your com- Risks puter primarily for word processing, too tirme- consuming make daily backups too expensive to keep your data in a fire-proof vault and I too complex to implement password security On ...