Automated information systems security
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
In telecommunication, automated information systems security comprises measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by automated information systems. The unauthorized disclosure, modification, or destruction may be accidental or intentional.
Automated information systems security includes consideration of all computer hardware and software functions, characteristics and features; operational procedures; accountability procedures; and access controls at the central computer facility, remote computer, and terminal facilities; management constraints; physical structures and devices, such as computers, transmission lines, and power sources; and personnel and communications controls needed to provide an acceptable level of risk for the automated information system and for the data and information contained in the system. Automated information systems security also includes the totality of security safeguards needed to provide an acceptable protection level for an automated information system and for the data handled by an automated information system.