Chapter 1. Is There a Security Problem in Computing?
In this chapter:
The risks involved in computing
The goals of secure computing: confidentiality, integrity, availability
The threats to security in computing: interception, interruption, modification, fabrication
Controls available to address these threats: encryption, programming controls, operating systems, network controls, administrative controls, law, and ethics
Get Security in Computing, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.