Computers, Business, and Security - 1st Edition - ISBN: 9780409900651, 9781483144894

Computers, Business, and Security

1st Edition

The New Role for Security

Authors: James A Schweitzer
eBook ISBN: 9781483144894
Imprint: Butterworth-Heinemann
Published Date: 19th February 1987
Page Count: 166
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.

Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communications systems. Other chapters consider the integration of electronic information technology into the security function. This book discusses as well the need for the integration of computing technology into the business security staff. The final chapter deals with the structure of the security program and explains the components of the overall security responsibility. This book is a valuable resource for professional business security managers, systems administrators, and software/hardware maintenance specialists.

Table of Contents


Part I The Computer and Security in the Information Age

Chapter 1 Managing Security in the Information Age

The Five Critical Tasks

Implications for Business Security

Chapter 2 Computers and Security

Risks in Using Computers

Applying Information Security Technology

Defining Preferred Protection Methods

Levels of Protection

Protecting Mental Information

Protecting Written Information

Protecting Electronic Information

The Technology of Attack

Causes of Security Violations

Protection Measures


Part II The Five Critical Tasks

Chapter 3 Critical Task 1: Integrating Computing into the Security Function

Technical Competence on the Security Staff

Selecting the Right Person

Job Assignments

Electronic Security Tasks

Electronic Information Security Standards

Chapter 4 Critical Task 2: Integrating Technology into the Security Function


Sensing Technologies


Control Systems

Biometrics and Smart Cards

Electronic Surveillance and Countermeasures

Radio Wave Interception

System Integration

Chapter 5 Critical Task 3: Adapting the Business Security Management Process to Information Age Requirements

Information Application

Reduction of Overhead, Improvement of Quality, Return on Assets

Making Security Investment Decisions

Security Strategy as a Basis for Choice

Chapter 6 Critical Task 4: Protecting the Business Information Resource


A Beginning

Information Resource Management

Attributes of Quality Information

Implementing Information Resource Management

Security Roles in Information Resource Management

Classification of Information

Setting Policy

Regulations Covering Classification

General Guidelines

Classification References

Chapter 7 Critical Task 5: Establishing Security as an Essential Management Function

The Security Manager as Business Executive

Establishing Leadership among Peers in the Company

The Security Manager and Senior Executive Management

Executive Management Characteristics

Considerations: The Security Manager and Executive Management

Risk Management Concepts: A Framework

Part III Securing Today's Business

Chapter 8 Putting It Together: A Security Program for the Information Age

Program Assumptions and Requirements

The Security Manager as a Business Manager

The Right Security Product

Making Competent Technology Decisions

Demonstrating a Contribution

Security Organization for the Information Age

Principles of Security Organization

Organizational Alternatives


Setting the Security Organizational Structure

Rules of Thumb for Security Organization

Implementing the Security Program

Getting the Security Message to the People

The Security Coordinator Network

The Security Coordinator's Tasks

Security Coordinator Selection, Training, and Motivation

Chapter 9 Business Security Operations in the Information Age


Working Relationships

The Core Functions

Support to Unit or Local Security Activities


The Security Career Path

Unit or Local Responsibilities

Chapter 10 Security Policies and Standards


Standards or Procedures

Details for Security Standards

Preparing the Standards

Organization of the Standards

An Illustrative Electronic Information Security Standard

Sample Standards

Appendix A A Primer on Computing

Appendix B Sample Information Security Policy

Appendix C Sample Electronic Security Review

Appendix D A Glossary of Technology Terms




No. of pages:
© Butterworth-Heinemann 1987
eBook ISBN:

About the Author

James A Schweitzer

Ratings and Reviews