Security in Computing, 4th Edition

 <  Free Open Study  >  

In this chapter:

  • The risks involved in computing

  • The goals of secure computing: confidentiality, integrity, availability

  • The threats to security in computing: interception, interruption, modification, fabrication

  • Controls available to address these threats: encryption, programming controls, operating systems, network controls, administrative controls, law, and ethics

 <  Free Open Study  >  

Категории