Management Strategies for Computer Security