Previous Page
Next Page

Chapter 2: Attacks, Motives, and Methods

Overview

In Chapter 1, we defined the three pillars of information security as the confidentiality, integrity, and availability of information. Unfortunately, defining what is a secure system is not as universal and as simple as defining information security itself. With that said, in this chapter we'll dissect the concept of secure systems and talk about trust, threat, and risk, and we'll look at attackers and their motives.


Previous Page
Next Page