Date Published: October 1989
Author(s)
Cheryl Helsing (Deloitte, Haskins & Sells), Marianne Swanson (NIST), Mary Anne Todd (NIST)
While excellent progress has been made in computer technology, very little has been done to inform users of the vulnerability of data and information to such threats as unauthorized modification, disclosure, and destruction, either deliberate or accidental. This guide will make users aware of some of the undesirable things that can happen to data and will provide some practical solutions for reducing the risks to these threats.
While excellent progress has been made in computer technology, very little has been done to inform users of the vulnerability of data and information to such threats as unauthorized modification, disclosure, and destruction, either deliberate or accidental. This guide will make users aware of some...
See full abstract
While excellent progress has been made in computer technology, very little has been done to inform users of the vulnerability of data and information to such threats as unauthorized modification, disclosure, and destruction, either deliberate or accidental. This guide will make users aware of some of the undesirable things that can happen to data and will provide some practical solutions for reducing the risks to these threats.
Hide full abstract
Keywords
awareness; computer security; data protection; information resources management
Control Families
None selected