Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
This book provides a unique in–depth focus on how financial organizations and suppliers of computer security are currently addressing – in strategic terms – the problem of computer security.
Written in an easy to read, non technical style the book is essential reading for all those involved in the management of this sensitive area, from computer security managers, financial directors and managers to analysts and designers in financial software houses.
The report analyses the computer security requirements of a wide variety of organizations in the financial services sector, ranging from retail, commercial and investment banks to financial trading and investment management organizations.
Introduction. The Computer Security Problem.
★ Prioritizing computer security
★ Computer security technology
★ Developing a strategic approach to computer security
★ Principal computer security hazards and responses
★ The physical access hazard
★ The electronic access hazard
★ A note on password security
★ The communications hazard
★ The systems shutdown hazard
★ Impact analysis
★ Contingency planning
★ Disaster recovery service options
★ "Hot" disaster recovery service
★ The electromagnetic induction hazard
★ Banking control mechanisms
★ Audit trails
★ Computer security – a personal view
★ Security at SWIFT
The Computer Criminal at Work.
A comprehensive examination of the factors that motivate computer criminals, plus examples of Computer Crimes.
Computer Security and the Law.
Covering legislation initiatives in the UK and USA and key enforcement agencies.
I: "Trouble Ahead: Information Crime & Jurisdiction". II: The Enforcers: The United States Secret Service ★ The City of London Police Fraud Department ★ The UK Serious Fraud Office ★ Kroll Associates. III: Computer Crime Legislation in the United States and UK.
Preventing Breaches in Computer Security.
This chapter summarizes the major findings of the report, and enables financial organizations to plan successfully their computer security policy. Guidelines for maximising Computer Security are also given.
Bibliography. Glossary. Index.
- No. of pages:
- © Elsevier Science 1990
- 21st September 1990
- Elsevier Science
- Paperback ISBN:
- eBook ISBN:
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.