September 2000
Intermediate to advanced
552 pages
12h 9m
English
Security is, perhaps, the most important and necessary assurance requirement to consider when deploying a system. Because computing systems assume more and more widespread business and mission-critical functionality each day, the cost associated with a breach of security is also increasing. Furthermore, because security problems are human-induced problems, the range of possible problems is as limitless as the human mind. Security, thus, becomes a crucial problem to solve. This chapter prepares you with the conceptual background to understand the notions and terminology used throughout the remainder of the book.
In this chapter, you will learn about the following:
The basic model for providing security for computing applications ...