HP OpenVMS Guide to System Security > Chapter 1 Understanding System
SecurityTypes of Computer Security Problems
On any system there can be two types of users: authorized and unauthorized. Any person authorized to use the computer system has the right to access the system and its resources according to the authorization criteria set up by the site security administrator. Usage criteria may include the time of day, types of logins, use of different resources like printers and terminals, and so on. Unauthorized users have no right to use the system at all or only at a given time of day, or they have no right to use certain system resources. On a computer system, security breaches usually result from one of four types of actions:
The following chapters explain how to avoid these problems:
|