Case Study: Trustworthy Computing

SCENARIO

ESSENCE OF THE CASE

The essence of this case and the thrust of Trustworthy computing is

  • Availability— Lack of system outages, and self-recovery when necessary.

  • Security— Data and systems should be protected.

  • Privacy— Users control their own data.

  • Trustworthiness— From chips to customer service, a broad category that means customers can rely on Microsoft products.

  • Manageability— Relative to size and complexity, the system is easy to install and maintain.

  • Responsiveness— The company takes responsibility for its product and helps customers to resolve problems.

  • Transparency— The company is open with customers.

  • Accuracy— Results are free from error, and protected.

  • Usability— Software is easy to use.

Can ...

Get CISSP Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.