First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

chapter |16 pages

Data Security – An Introduction

ByJohn Gordon

chapter 1|6 pages

An Organisation for Security in a Major Company

ByCharles Brookson

chapter 3|18 pages

Closing the Evaluation Gap – The CLEF Experience

ByAndrew Clark, Andrea Cumming

chapter 4|10 pages

Mechanisms of Stealth

ByAlan Solomon

chapter 5|15 pages

Computer Viruses

ByJan Hruska

chapter 6|11 pages

Security Modelling

ByJohn Gordon

chapter 7|6 pages

Secure Delivery of Software

ByFiona Williams, Samantha Green

chapter 8|11 pages

Digital Signatures for Non-Repudiation

ByFred Piper

chapter 9|11 pages

Network Encryption Management

ByVince Gallo

chapter 10|21 pages

Computer Crime: Law and Regulation – Protection and Prosecution

ByWendy R London

chapter 11|14 pages

A Structured Control Methodology to Aid Data Security

ByJohn Mitchell

chapter 12|8 pages

Securing your PC

ByAlex McIntosh