Introduction - keys issues in information security, J.E. Ettinger; an overview of leading security issues, D. Lindsay; computer security policies - personnel security, M.R. Smith; management - the key to effective distributed systems security, S. Rowley; management of secure systems and security within OSI, C. Mitchell; the current status of CRAMM - the CCTA risk analysis and management methodology, R. Moses; risk analysis and management, S. Dosanju, et al; viruses on personal computers, J. Hruska; principals and management of cryptography, P.J. Francis; data encryption and its applications to computer security, J. Gordon; distributed secure system technology demonstrator programme, A.S. Bates; a secure European system of applications in a multi-vendor environment (the SESAME project), T.A. Parker; the IT security awareness programme for business, B. Murray; licensed security evaluation, T. Farr; the impact of the Computer Misuse Act 1990 on information security, M. Lee.