The Security Role of Components of Computer Configurations

Control methods for data security are discussed in the previous chapter. They are access control, information control, inference control and cryptography. In this chapter hardware, system software, communications and terminals are considered to show how the four data security control methods are implemented in computer configuration components. Online systems depend for their security on good application software — the design of application software is considered in chapter 6 — but in addition application software for online systems, like other application software, requires a secure environment in which to operate.