1. Security Blanket or Security Theater?

Chapter Spotlight

• Computer security: the threat–vulnerability–countermeasure paradigm

• Harm to confidentiality, integrity, availability

• Nature of threats; method–opportunity–motive; risk

• Kinds of attackers

• Countermeasure effects: prevent, deter, detect, recover

• Analyzing security

Imagine a series of events unfolding on a single day. First, 20 million U.S. smart phones stop working. Next follow outages in wireline telephone service, problems with air traffic control, disruptions to the New York Stock Exchange, ...

Get Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.