| United States. Congress. Senate. Committee on Governmental Affairs - 1998 - 232 páginas
...Pub 800-14) in September 1996. 8 Its eight principles are listed below. 1. Computer Security Supports the Mission of the Organization 2. Computer Security...Management 3. Computer Security Should Be Cost-Effective 4. Systems Owners Have Security Responsibilities Outside Their Own Organizations 5. Computer Security... | |
| United States. Congress. Senate. Committee on Governmental Affairs - 1998 - 264 páginas
...Pub 800-14) in September 1996.6 Its eight principles are listed below. 1. Computer Security Supports the Mission of the Organization 2. Computer Security...of Sound Management 3. Computer Security Should Be CostrEffective 4. Systems Owners Have Security Responsibilities Outside Their Own Organizations 5.... | |
| Jack L. Brock, Jr. - 2000 - 70 páginas
...Technology Systems in September 1996. Its eight principles are listed below. 1. Computer Security Supports the Mission of the Organization 2. Computer Security...Management 3. Computer Security Should Be Cost-effective 4. Systems Owners Have Security Responsibilities Outside Their Own Organizations 5. Computer Security... | |
| Susan Hansche - 2005 - 814 páginas
...interdependencies that may exist with other controls. The SP 800-12 principles of computer security are: 1. Computer security should support the mission of...Computer security is constrained by societal factors (p. 9). The eight principles are based on the Organization for Economic Cooperation and Development's... | |
| Marlin B. Pohlman - 2008 - 552 páginas
...practices are described within this document. The eight principles are 1. Computer security supports the mission of the organization. 2. Computer security...of sound management. 3. Computer security should be cost effective. 4. Systems owners have security responsibilities outside their own organizations. 5.... | |
| 1998 - 69 páginas
...Pub 800-14) in September 1996. 6 Its eight principles are listed below. 1. Computer Security Supports the Mission of the Organization 2. Computer Security...Management 3. Computer Security Should Be Cost-Effective 4. Systems Owners Have Security Responsibilities Outside Their Own Organizations 5. Computer Security... | |
| |