Discusses the necessity of computer access control mechanisms, particularly passwords, to protect information. Suggests that many organizations allow practices which compromise the security of their data. Highlights a policy on the proper storage of passwords and other security parameters which should form the foundation of an information security effort.
CitationDownload as .RIS
MCB UP Ltd
Copyright © 1997, MCB UP Limited