Chapter 1. Is There a Security Problem in Computing?

In this chapter:

  • The risks involved in computing

  • The goals of secure computing: confidentiality, integrity, availability

  • The threats to security in computing: interception, interruption, modification, fabrication

  • Controls available to address these threats: encryption, programming controls, operating systems, network controls, administrative controls, law, and ethics

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.