skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security Overview Security Overview
go to beginning of chapter: Understanding System Security Understanding System Security
 
go to next page: Levels of Security RequirementsLevels of Security Requirements
end of book navigation links

Types of Computer Security Problems  



On any system there can be two types of users: authorized and unauthorized. Any person authorized to use the computer system has the right to access the system and its resources according to the authorization criteria set up by the site security administrator. Usage criteria may include the time of day, types of logins, use of different resources like printers and terminals, and so on. Unauthorized users have no right to use the system at all or only at a given time of day, or they have no right to use certain system resources.

On a computer system, security breaches usually result from one of four types of actions:

The following chapters explain how to avoid these problems:


 
go to next page: Levels of Security RequirementsLevels of Security Requirements