Intended to assist in the implementation of an adequate computer security program for the protection of automated information resources within the various agencies of state government. Includes: physical security, data encryption, data communication systems, voice communication systems, personnel practices, and much more. Originally prepared for the State of Texas, applicable to all states and localities. Glossary.11.7 ENCRYPTION Encryption, or the coding of data to make it unintelligible to anyone not having the security key, is a ... All manuals supplying documentation relating to the installation and use of proprietary software should be located in an anbsp;...
|Title||:||Information Resources Security and Risk Management|
|Publisher||:||DIANE Publishing - 1993-01-01|