Security Overview
•To implement a good security scheme, you identify the risk, determine how you will protect the affected asset, and calculate the cost of the resources you can allocate to protect the asset.
•
•Computer security can be classified into several categories:
§Secrecy
§Integrity
§Necessity