Presented by developerWorks, your source for great tutorials ibm.com/developerWorks
Table of Contents
If you're viewing this document online, you can click any of the topics below to link directly to that section.
1. Tutorial tips 2. Security concepts 3. Physical security 4. Logistical security 5. Data security 6. Technical security 7. Overview and summary 8. Feedback
2 3 5 6 7 9 11 12
General computer security
Page 1
Presented by developerWorks, your source for great tutorials
ibm.com/developerWorks
Section 1. Tutorial tips Should I take this tutorial?
The objective of this tutorial is to give an overview of the security process surrounding computer systems. It is aimed at the computer professional who may or may not already have some security background. This tutorial is general in scope. Many of the issues covered here will be examined in more depth in future tutorials.
Tutorial navigation
Navigating through the tutorial is easy: * Use the Next and Previous buttons to move forward and backward through the tutorial. * Use the Main menu button to return to the tutorial menu. * If you'd like to tell us what you think, use the Feedback button. * If you must stop and want to resume on a specific panel, use the Section menu to find your place again.
About the author
Larry Loeb has been writing and consulting since the 20th century about computer topics. He has published a book on SET, the protocol developed by Visa and MasterCard for secure electronic transactions. He can usually be contacted at larryloeb@prodigy.net .
General computer security
Page 2
Presented by developerWorks, your source for great tutorials
ibm.com/developerWorks
Section 2. Security concepts Security is spherical
Computer systems can never have absolute security in real life. They exist to be used; not to be admired in a locked room sealed away from the outside world. Systems can, however, be made more secure than they