An enterprise can use three main approaches to computer security: one based on correctness, one involving isolation, and one involving. The ideal method is to employ all three together.
- Chapter 1 Introduction and Security Trends
- from Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition, 5th Edition
- Publisher: McGraw-Hill
- Released: June 2018
There is a typo in this section as the third approach is not named. It is apparently obfuscation.
Share this highlighthttp://www.safaribooksonline.com/a/principles-of-computer/15126747/