Loading previews...
Summary: | Since the first attempts to protect information, the weakest link in the security chain has always been the people involved. A system can have the most expensive firewall equipment, the best antivirus software and the greatest intrusion detection system, but if the "weakest link" is ignored it can be worthless. Hence, no matter how secure the equipment is from electronic invasion, the knowledge extracted from a legitimate user may render a computer network inoperable if used in an unauthorised manner. |
---|---|
Creators: | |
Divisions: | Academic > School of Computing, Engineering and Built Environment > Department of Computing |
Copyright holder: | Copyright © Glasgow Caledonian University |
Viewing permissions: | World |
Depositing User: | |
Date Deposited: | 26 Sep 2018 13:47 |
Last Modified: | 13 Feb 2020 12:10 |
URI: | https://edshare.gcu.ac.uk/id/eprint/4129 |
Actions (login required)
View Item |
Toolbox
There are no actions available for this resource.