Security Engineering: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
'''Abstract:''' As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]

----

*[[Security Concerns]] (Authenticity, Integrity, Privacy, Non-Repudiation)
*[[Security Concerns]] (Authenticity, Integrity, Privacy, Non-Repudiation)
*[[Passwords]]
*[[Passwords]]

Revision as of 17:08, 18 October 2004

Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]