SlideShare a Scribd company logo
COMPUTER SECURITY POLICY Ridha  Ben  Hammouda EVEREST UNIVERSITY-South Orlando Campus © 2008
COMPUTER SECURITY POLICY Computer security professionals around the world face the same risks.  This presentation takes a holistic approach to solving this problem and offers some helpful suggesions.
COMPUTER SECURITY POLICY Computer security policy needs of industry and government have been a priority since the early 1990’s.  These policies relate to internet security, firewalls, virus protection and statistical methods of computer security.  Internet security professionals around the world face the same risks when it comes to the lack of needed resources to develop and sustain an effective security policy (Waning Security, 1996, p. 3).  A holistic approach in computer security policy is needed (Scientists on Cybersecurity, 2002b, p. 38).
COMPUTER SECURITY POLICY The National Research Council, which advises the government on technology matter, examines cybersecurity issues including the nature of cybertrheats and common causes of system and network problems.  The agency has developed some controversial policy recommendations, such as making software and system vendors legally responsible for insecure products and systems (Scientists on Cybersecurity, 2002c, p. 38).
COMPUTER SECURITY POLICY The security risks posed by microcomputers need to be controlled because microcomputers are being used more frequently in large financial reporting systems.  These risks include threats to  data integrity unauthorized information access, and  theft.
COMPUTER SECURITY POLICY A cost-effective security plan should  identify business assets that need protection, and  risks from which the assets need to be safeguarded.  Controls can then be designed and based on the level of exposure to loss.
COMPUTER SECURITY POLICY Specific security procedures that can be implemented include  (1) policy statements on computer security guidelines,  (2) locking devices,  (3) password protection,  (4) security software such as data encryption programs (5) data backup procedures to insure against accidental or intentional destruction of data (Herdman & Neary, 1987b, p. 9).
COMPUTER SECURITY POLICY Research shows that corporate losses due to poor computer security are more likely to result from error than from fraud.  Further, more fraud losses are caused by employees than by outsiders
COMPUTER SECURITY POLICY .  A proper corporate computer security program takes a team approach, with components including  examination of the kinds of information the company deals  Consideration of the level of protection appropriate to each during every phase of its life ongoing design  Education  Separation of functions  access controls audit trails regular backup enforcement
COMPUTER SECURITY POLICY   A well-documented, well-publicized security policy can help companies comply with new  federal and state laws and prosecute violators  more effectively (Thackeray, 1988b, p. 45)
COMPUTER SECURITY POLICY   Data security across networks is also an important issue for network administrators.  To secure intranetworks, some elements to include in a computer security policy are:  (1) permission rules, (2) responsibilities,  (3) unauthorized access to files and directories,  (4) unauthorized use of software,  (5) use of the network in for-profit activities,  (6) use of electronic mail,  (7) harassment, (8) waste,  (9) abuse,  (10) theft,  (11) enforcement, (12) workplace monitoring,  (13) network managers’ responsibilities  (14) use of the network for non-company tasks
COMPUTER SECURITY POLICY The following procedures are recommended for application by internet security professionals: 1.  Permission – Use of computer facilities must be authorized by the owner of the information or by a senior manage.  Prior permission to use another user’s computer account or user-ID from the owner of the account should be required.  All computer or electronic files are considered private unless the owner has explicitly made them available to others. 2.  Responsibilities – The user is owner of their data.  It is their responsibility to ensure that it is adequately protected against unauthorized access.  Keep passwords and accounts confidential; change passwords frequently.  Do not leave terminals unattended without logging out first.  Do not engage in any activity that is intended to circumvent computer security controls. Do not access the accounts of others with the intent to read, browse, modify, copy or delete files and directories without authorization. 3.  Unauthorized Use of Software –Users should be prohibited from loading any software on any computer system (i.e. shareware o freeware software) without approval from the system administrator and your supervisor.  Users should be expressly prohibited from using company computers to make illegal copies of licensed or copyrighted software.  Copyrighted software must only be used in accordance with its license or purchase agreement.
COMPUTER SECURITY POLICY 4.  Harassment – Company computer systems are not to be used to harass anyone. This includes the use of insulting, sexist, racist, obscene or suggestive electronic mail, tampering with others’ files invasive access to others’ equipment. Etc. 5.  Destruction of Records – Instruct employees how to dispose of old manuals, floppy disks.  Shredding and thoroughly erasing floppy disks, removing any information that could be used by an outsider to penetrate a company’s computer system.  Recycle ink and toner cartridges. 6.  Networks – Disallow use of the company-owned network (or other network accessible by company computers) for any activity other than company business.  This includes surfing the Internet, online discussions in newsgroups and bulletin board services, attempting to access other computer systems without authorization, posting commercial messages, and transmitting viruses, worms, or other invasive software.
COMPUTER SECURITY POLICY 7.  Enforcement – Investigate all alleged abuses of computer resources. Each employee must be responsible for their own actions.  A company has the obligation to ensure that its computer resources are used properly and within the guidelines established by the company.  The company should have access to all electronic files of its employees. Limiting the access of guilty employees is appropriate.  Refer flagrant abuses to senior managers or law enforcement authorities.  In extreme cases of flagrant abuse or disregard of computer security guidelines,  may result in termination of employment 8.  Workplace Monitoring – A company must reserve the right to monitor the computer system for signs of illegal or unauthorized activity. (Alexander, 1995b, p. 59)
COMPUTER SECURITY POLICY CONCLUSION - Computer security professionals must be highly trained, continuously updating their education, and constantly vigilant in order to protect their company from intruders who would cause them harm.  - Computer security professionals must have integrity and be trustworthy.  - Computer security professionals are becoming  increasingly valuable and powerful as we become a global community and market place.
COMPUTER SECURITY POLICY References Alexander, M. (1995b). Make It a Policy to Protect Yourself.  Datamation ,  41  (22), 59. Retrieved May 19, 2008, from http://find.galegroup.com. Herdman, R. K., & Neary, R. D. (1987a). Planning Your Microcomputer Security Strategy.  Financial Executive ,  3  (4), 9. Retrieved May 19, 2008, from http://find.galegroup.com. How Much Computer Security. (1992).  Across the board ,  29  (2), 12. Retrieved May 19, 2008, from http://find.galegroup.com. Scientists on Cybersecurity. (2002a).  Security Management ,  46  (4), 38. Retrieved May 19, 2008, from http://gind.galegroup.com. Thackeray, G. (1988a). Computer Security:  The Manace is From Inside.  The Office ,  108  (4), 45. Retrieved May 19, 2008, from http://find.galegroup.com.
COMPUTER SECURITY POLICY Ridha  Ben  Hammouda EVEREST UNIVERSITY-South Orlando Campus ©2008

More Related Content

DOC
Computer Security Policy
everestsky66
 
PPTX
5 Step Data Security Plan for Small Businesses
Wilkins Consulting, LLC
 
PPTX
12 security policies
Saqib Raza
 
DOC
System Security Threats and Risks)
BPalmer13
 
PPTX
Information Security : Is it an Art or a Science
Pankaj Rane
 
PPTX
InformationSecurity
learnt
 
PPT
Start With A Great Information Security Plan!
Tammy Clark
 
PPTX
Importance Of A Security Policy
charlesgarrett
 
Computer Security Policy
everestsky66
 
5 Step Data Security Plan for Small Businesses
Wilkins Consulting, LLC
 
12 security policies
Saqib Raza
 
System Security Threats and Risks)
BPalmer13
 
Information Security : Is it an Art or a Science
Pankaj Rane
 
InformationSecurity
learnt
 
Start With A Great Information Security Plan!
Tammy Clark
 
Importance Of A Security Policy
charlesgarrett
 

What's hot (20)

DOCX
Information security policy
BalachanderThilakar1
 
PPT
Information security management
UMaine
 
DOCX
Cat21:Development Mangement Information Systems
Simeon Ogao
 
PPT
Information Security Awareness And Training Business Case For Web Based Solut...
Michael Kaishar, MSIA | CISSP
 
PPT
Introduction to information security
Dhani Ahmad
 
PPT
Information security.pptx
Veer Rengu korku Govt. College Khaknar
 
PPT
2 Security And Internet Security
Ana Meskovska
 
PPTX
Securing information system
Tanjim Rasul
 
DOCX
The Role of Information Security Policy
Robot Mode
 
PPTX
17 info sec_ma_imt_27_2_2012
RECIPA
 
PPTX
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 
PPT
Security & control in management information system
Online
 
PDF
The importance of information security
ethanBrownusa
 
PDF
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD
 
PPTX
IT Security and Risk Mitigation
Mukalele Rogers
 
PPTX
INFORMATION SECURITY
Ahmed Moussa
 
PPTX
Information Systems Policy
Ali Sadhik Shaik
 
PPTX
Introduction to information security
KATHEESKUMAR S
 
PPT
Information Technology Security A Brief Overview 2001
Donald E. Hester
 
PDF
5 Things to Know about Safety and Security of Embedded Systems
MEN Mikro Elektronik GmbH
 
Information security policy
BalachanderThilakar1
 
Information security management
UMaine
 
Cat21:Development Mangement Information Systems
Simeon Ogao
 
Information Security Awareness And Training Business Case For Web Based Solut...
Michael Kaishar, MSIA | CISSP
 
Introduction to information security
Dhani Ahmad
 
Information security.pptx
Veer Rengu korku Govt. College Khaknar
 
2 Security And Internet Security
Ana Meskovska
 
Securing information system
Tanjim Rasul
 
The Role of Information Security Policy
Robot Mode
 
17 info sec_ma_imt_27_2_2012
RECIPA
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 
Security & control in management information system
Online
 
The importance of information security
ethanBrownusa
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD
 
IT Security and Risk Mitigation
Mukalele Rogers
 
INFORMATION SECURITY
Ahmed Moussa
 
Information Systems Policy
Ali Sadhik Shaik
 
Introduction to information security
KATHEESKUMAR S
 
Information Technology Security A Brief Overview 2001
Donald E. Hester
 
5 Things to Know about Safety and Security of Embedded Systems
MEN Mikro Elektronik GmbH
 
Ad

Viewers also liked (8)

PPTX
Review of national cyber security policy 2013 by chintan pathak
Chintan Pathak
 
PPT
Security policy
Dhani Ahmad
 
PPTX
Shift Happens: Eliminating the Risks of Network Security Policy Changes
AlgoSec
 
PDF
Security Policy Checklist
backdoor
 
PPTX
A business driven approach to security policy management a technical perspec...
AlgoSec
 
PDF
Wireless LAN Security, Policy, and Deployment Best Practices
Cisco Mobility
 
PPT
Professional Education Reviewer
Zin Bacus
 
PPSX
Principles of education and teaching learning process
Nursing Path
 
Review of national cyber security policy 2013 by chintan pathak
Chintan Pathak
 
Security policy
Dhani Ahmad
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
AlgoSec
 
Security Policy Checklist
backdoor
 
A business driven approach to security policy management a technical perspec...
AlgoSec
 
Wireless LAN Security, Policy, and Deployment Best Practices
Cisco Mobility
 
Professional Education Reviewer
Zin Bacus
 
Principles of education and teaching learning process
Nursing Path
 
Ad

Similar to Computer Security Policy D (20)

PPTX
Cyber Security unit-4.pptx for computers
2k24mca2412994
 
PDF
Information security policy how to writing
PasangdolmoTamang
 
DOCX
ISSC481_Term_Paper_John_Intindolo
John Intindolo
 
PDF
Ch06 Policy
phanleson
 
PPT
Information security policy_2011
codka
 
PPT
Information security policy_2011
codka
 
PDF
Free_business_IT_security_policy_template_v5.pdf
klodianelezi1
 
PDF
Security policy.pdf
Md. Sajjat Hossain
 
PDF
Building and implementing a successful information security policy
RossMob1
 
PDF
1-Computer_Security_EENG-524_Lecture-01.pdf
Umarr Alie Sesay
 
PDF
How to write your company's it security policy it-toolkits
IT-Toolkits.org
 
PPTX
Information security: importance of having defined policy & process
Information Technology Society Nepal
 
PPTX
Information security
Shanthamallachar D B
 
PDF
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
PPT
Policy-1.pptznlaldjwodmwlznalpqjdc ktpanV
wardaabbas1
 
PPT
3.5 ICT Policies
mrmwood
 
PPTX
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
PPTX
Network Security Basics in networking to learn
amansinght675
 
PPTX
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Bonagiri Rajitha
 
PDF
Ch09 Information Security Best Practices
phanleson
 
Cyber Security unit-4.pptx for computers
2k24mca2412994
 
Information security policy how to writing
PasangdolmoTamang
 
ISSC481_Term_Paper_John_Intindolo
John Intindolo
 
Ch06 Policy
phanleson
 
Information security policy_2011
codka
 
Information security policy_2011
codka
 
Free_business_IT_security_policy_template_v5.pdf
klodianelezi1
 
Security policy.pdf
Md. Sajjat Hossain
 
Building and implementing a successful information security policy
RossMob1
 
1-Computer_Security_EENG-524_Lecture-01.pdf
Umarr Alie Sesay
 
How to write your company's it security policy it-toolkits
IT-Toolkits.org
 
Information security: importance of having defined policy & process
Information Technology Society Nepal
 
Information security
Shanthamallachar D B
 
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Policy-1.pptznlaldjwodmwlznalpqjdc ktpanV
wardaabbas1
 
3.5 ICT Policies
mrmwood
 
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
Network Security Basics in networking to learn
amansinght675
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Bonagiri Rajitha
 
Ch09 Information Security Best Practices
phanleson
 

Recently uploaded (20)

PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Architecture of the Future (09152021)
EdwardMeyman
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Architecture of the Future (09152021)
EdwardMeyman
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
This slide provides an overview Technology
mineshkharadi333
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 

Computer Security Policy D

  • 1. COMPUTER SECURITY POLICY Ridha Ben Hammouda EVEREST UNIVERSITY-South Orlando Campus © 2008
  • 2. COMPUTER SECURITY POLICY Computer security professionals around the world face the same risks. This presentation takes a holistic approach to solving this problem and offers some helpful suggesions.
  • 3. COMPUTER SECURITY POLICY Computer security policy needs of industry and government have been a priority since the early 1990’s. These policies relate to internet security, firewalls, virus protection and statistical methods of computer security. Internet security professionals around the world face the same risks when it comes to the lack of needed resources to develop and sustain an effective security policy (Waning Security, 1996, p. 3). A holistic approach in computer security policy is needed (Scientists on Cybersecurity, 2002b, p. 38).
  • 4. COMPUTER SECURITY POLICY The National Research Council, which advises the government on technology matter, examines cybersecurity issues including the nature of cybertrheats and common causes of system and network problems. The agency has developed some controversial policy recommendations, such as making software and system vendors legally responsible for insecure products and systems (Scientists on Cybersecurity, 2002c, p. 38).
  • 5. COMPUTER SECURITY POLICY The security risks posed by microcomputers need to be controlled because microcomputers are being used more frequently in large financial reporting systems. These risks include threats to data integrity unauthorized information access, and theft.
  • 6. COMPUTER SECURITY POLICY A cost-effective security plan should identify business assets that need protection, and risks from which the assets need to be safeguarded. Controls can then be designed and based on the level of exposure to loss.
  • 7. COMPUTER SECURITY POLICY Specific security procedures that can be implemented include (1) policy statements on computer security guidelines, (2) locking devices, (3) password protection, (4) security software such as data encryption programs (5) data backup procedures to insure against accidental or intentional destruction of data (Herdman & Neary, 1987b, p. 9).
  • 8. COMPUTER SECURITY POLICY Research shows that corporate losses due to poor computer security are more likely to result from error than from fraud. Further, more fraud losses are caused by employees than by outsiders
  • 9. COMPUTER SECURITY POLICY . A proper corporate computer security program takes a team approach, with components including examination of the kinds of information the company deals Consideration of the level of protection appropriate to each during every phase of its life ongoing design Education Separation of functions access controls audit trails regular backup enforcement
  • 10. COMPUTER SECURITY POLICY A well-documented, well-publicized security policy can help companies comply with new federal and state laws and prosecute violators more effectively (Thackeray, 1988b, p. 45)
  • 11. COMPUTER SECURITY POLICY Data security across networks is also an important issue for network administrators. To secure intranetworks, some elements to include in a computer security policy are: (1) permission rules, (2) responsibilities, (3) unauthorized access to files and directories, (4) unauthorized use of software, (5) use of the network in for-profit activities, (6) use of electronic mail, (7) harassment, (8) waste, (9) abuse, (10) theft, (11) enforcement, (12) workplace monitoring, (13) network managers’ responsibilities (14) use of the network for non-company tasks
  • 12. COMPUTER SECURITY POLICY The following procedures are recommended for application by internet security professionals: 1. Permission – Use of computer facilities must be authorized by the owner of the information or by a senior manage. Prior permission to use another user’s computer account or user-ID from the owner of the account should be required. All computer or electronic files are considered private unless the owner has explicitly made them available to others. 2. Responsibilities – The user is owner of their data. It is their responsibility to ensure that it is adequately protected against unauthorized access. Keep passwords and accounts confidential; change passwords frequently. Do not leave terminals unattended without logging out first. Do not engage in any activity that is intended to circumvent computer security controls. Do not access the accounts of others with the intent to read, browse, modify, copy or delete files and directories without authorization. 3. Unauthorized Use of Software –Users should be prohibited from loading any software on any computer system (i.e. shareware o freeware software) without approval from the system administrator and your supervisor. Users should be expressly prohibited from using company computers to make illegal copies of licensed or copyrighted software. Copyrighted software must only be used in accordance with its license or purchase agreement.
  • 13. COMPUTER SECURITY POLICY 4. Harassment – Company computer systems are not to be used to harass anyone. This includes the use of insulting, sexist, racist, obscene or suggestive electronic mail, tampering with others’ files invasive access to others’ equipment. Etc. 5. Destruction of Records – Instruct employees how to dispose of old manuals, floppy disks. Shredding and thoroughly erasing floppy disks, removing any information that could be used by an outsider to penetrate a company’s computer system. Recycle ink and toner cartridges. 6. Networks – Disallow use of the company-owned network (or other network accessible by company computers) for any activity other than company business. This includes surfing the Internet, online discussions in newsgroups and bulletin board services, attempting to access other computer systems without authorization, posting commercial messages, and transmitting viruses, worms, or other invasive software.
  • 14. COMPUTER SECURITY POLICY 7. Enforcement – Investigate all alleged abuses of computer resources. Each employee must be responsible for their own actions. A company has the obligation to ensure that its computer resources are used properly and within the guidelines established by the company. The company should have access to all electronic files of its employees. Limiting the access of guilty employees is appropriate. Refer flagrant abuses to senior managers or law enforcement authorities. In extreme cases of flagrant abuse or disregard of computer security guidelines, may result in termination of employment 8. Workplace Monitoring – A company must reserve the right to monitor the computer system for signs of illegal or unauthorized activity. (Alexander, 1995b, p. 59)
  • 15. COMPUTER SECURITY POLICY CONCLUSION - Computer security professionals must be highly trained, continuously updating their education, and constantly vigilant in order to protect their company from intruders who would cause them harm. - Computer security professionals must have integrity and be trustworthy. - Computer security professionals are becoming increasingly valuable and powerful as we become a global community and market place.
  • 16. COMPUTER SECURITY POLICY References Alexander, M. (1995b). Make It a Policy to Protect Yourself. Datamation , 41 (22), 59. Retrieved May 19, 2008, from http://find.galegroup.com. Herdman, R. K., & Neary, R. D. (1987a). Planning Your Microcomputer Security Strategy. Financial Executive , 3 (4), 9. Retrieved May 19, 2008, from http://find.galegroup.com. How Much Computer Security. (1992). Across the board , 29 (2), 12. Retrieved May 19, 2008, from http://find.galegroup.com. Scientists on Cybersecurity. (2002a). Security Management , 46 (4), 38. Retrieved May 19, 2008, from http://gind.galegroup.com. Thackeray, G. (1988a). Computer Security: The Manace is From Inside. The Office , 108 (4), 45. Retrieved May 19, 2008, from http://find.galegroup.com.
  • 17. COMPUTER SECURITY POLICY Ridha Ben Hammouda EVEREST UNIVERSITY-South Orlando Campus ©2008