ABSTRACT

It is the responsibility of the system owner* to provide the suitable controls over the application and network components to ensure that only authorized personnel can make changes to any component of the computer system and the security of the data residing on the system.