16. ‘Twas Brillig, and the Slithy Toves ...

Chapter Spotlight

• Incorrect data modification: sequencing, substitution, salami, and similarity errors

• Error correction and detection codes

• Redundancy, backups, mirroring

• Cryptographic chaining

Of the three goals of computer security—confidentiality, integrity, and availability—confidentiality receives the most attention: People want to be sure their financial, school, and medical data are not disclosed inappropriately, companies want to protect their intellectual property, and governments ...

Get Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.