CONTENTS
Chapter 1 Security from the Ground Up
1.1.1 Making Security Decisions
1.1.3 Continuous Improvement: A Basic Principle
1.2 Process Example: Bob’s Computer
1.3 Assets and Risk Assessment
1.3.4 Risk Assessment Overview
1.4.2 Security Properties, Services, and Attacks
1.5.1 Example: Risks to Alice’s Laptop
1.5.2 Other Risk-Assessment Processes
1.6 Ethical Issues in Security Analysis
1.6.1 Searching for Vulnerabilities
Get Elementary Information Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.