ABSTRACT

Security procedures are often ignored, and security controls are often not in place. This chapter presents guidelines for the data security administrator, who must ensure that security and integrity of data and facilities are not further compromised during the recovery and repair of systems and communications networks.