Table of contents
Bridging the gaps
Martin WhybrowFollowing recent London bomb attacks, examines the effectiveness ofdisaster recovery plans and the services that were available to assistrecovery. Also explores the mid‐ and…
Software Intelligence introduces a new cross‐platform, dient/server security solution
Elaine IrwinOutlines plans and products of Software Intelligence′s new divisionAXENT Technologies which will concentrate on information securitysolutions for client/server computers.
Business interruption insurance: a vital ingredient in your disaster recovery plan
T.J. ParadineExplains the importance of the risk management function as part ofthe disaster recovery‐planning process. Explains what you can and cannotinsure and the importance of not…
Simplifying the state and federal computer crime law maze in the USA
Jay BloombeckerComputer fraud, Law, Procedures, Punishment, USA Outlines in chartformat the definitions, prohibitions, procedures and punishments ofcomputer crime laws in the USA.
Testing the disaster recovery plan
Bruce Edwards, John CooperOrganizations need to have undertaken an analysis of business riskand to have formulated a recovery plan. However, only a small number ofbusinesses have made any attempt to…
Real security for local area networks
John CampbellDescribes a fifth‐operation software tool which is a powerfulnetwork manager that guards systems from intrusion and provides anaccurate system asset register.
Safeguarding databases: basic concepts revisited
Richard CardinaliThe thrust of management information system (MIS) operations is tokeep an information system running smoothly and to ensure services aredelivered in an uninterrupted, reliable and…
What if you had a flood in your computer room
Kevin J. FitzgeraldDeals with the dangers to computer systems from flooding andwater‐related hazards which so far appear to have been underestimated,and offers preventive and remedial advice to…
Information privacy
Graham CollierDistinguishes between confidentiality and privacy of informationheld on individuals, the latter by companies, but doubts that privacy,where applicable, is respected by many…