skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security OverviewSecurity Overview
go to beginning of chapter: Understanding System SecurityUnderstanding System Security
 
go to next page: Levels of Security RequirementsLevels of Security Requirements
end of book navigation links

Types of ComputerSecurity Problems  



On any system there can be two types of users: authorizedand unauthorized. Any person authorized to use the computer systemhas the right to access the system and its resources according tothe authorization criteria set up by the site security administrator.Usage criteria may include the time of day, types of logins, useof different resources like printers and terminals, and so on. Unauthorizedusers have no right to use the system at all or only at a giventime of day, or they have no right to use certain system resources.

On a computer system, security breaches usually result fromone of four types of actions:

The following chapters explain how to avoid these problems:


 
go to next page: Levels of Security RequirementsLevels of Security Requirements