| In this chapter: -
The risks involved in computing -
The goals of secure computing: confidentiality, integrity, availability -
The threats to security in computing: interception, interruption, modification, fabrication -
Controls available to address these threats: encryption, programming controls, operating systems, network controls, administrative controls, law, and ethics |