November 2018
Intermediate to advanced
1440 pages
48h 29m
English
MACBETH: I pull in resolution and begin To doubt th’ equivocation of the fiend That lies like truth: “Fear not, till Birnam wood Do come to Dunsinane,” and now a wood Comes toward Dunsinane. Arm, arm, and out!
— The Tragedy of Macbeth, V, v, 42–46.
Vulnerabilities arise from computer system design, implementation, maintenance, and operation. This chapter presents a general technique for testing for vulnerabilities in all these areas and discusses several models of vulnerabilities.
A “computer system” is more than hardware and software; it includes the policies, procedures, and organization under which that hardware and software is used. Lapses in security can arise from any of these areas ...