Part VI
Assurance
Contributed by Elisabeth Sullivan and Michelle Ruppel1
1These chapters were written by Elisabeth C. Sullivan and Michelle Ruppel. Ms. Sullivan and Ms. Ruppel have granted permission for this material to be used in Computer Security: Art and Science. Any use of this material outside the scope of this text must have the permission of Ms. Sullivan and Ms. Ruppel.
Security policies are assumed to be internally consistent and to reflect the requirements of the organization to which they apply. Similarly, security mechanisms are assumed to work correctly and to perform the functions for which they are intended. These critical aspects of trustworthiness are commonly glossed over because they are difficult to quantify or analyze. However, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access