•To
implement a good security scheme, you identify the risk, determine
how you will protect the affected asset, and calculate the cost
of the resources you can allocate to protect the asset.
•
•Computer
security can be classified into several categories:
§Secrecy
§Integrity
§Necessity