Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Chapter 09

Chapter 09

Ratings:

5.0

(2)
|Views: 11 |Likes:
Published by maged abbass
operating system
Chapter 9
by maged hameed abbass
operating system
Chapter 9
by maged hameed abbass

More info:

Published by: maged abbass on Apr 14, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

07/20/2009

pdf

text

original

 
1
SecurityChapter 9
9.1 The security environment9.2 Basics of cryptography9.3 User authentication9.4 Attacks from inside the system9.5 Attacks from outside the system9.6 Protection mechanisms9.7 Trusted systems
 
2
The Security Environment
ThreatsSecurity goals and threats
 
3
Intruders
Common Categories2.Casual prying by nontechnical users3.Snooping by insiders4.Determined attempt to make money5.Commercial or military espionage

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->