Abstract
The Handbook is presented as a set of methods and procedures in checklist
form which higlight the steps necessary to institute and maintain a more
secure environment. It also provides procedures used to detect inconsistencies
within the system, which may indicate breaches of security.