Map
Index
Random
Help
th

Quote: security setup constributes nothing to useful output; only noticed if audit or attack

topics > all references > references i-l > QuoteRef: lampBW6_2004 , p. 38



Topic:
security leaks and weaknesses
Group:
security

Quotation Skeleton

Security setup … takes time, and it contributes nothing to useful … or an attack. … [p. 39] The setup is all the data that … and so on. … [p. 40] Although most discussion of assurance focus on … [Trusted Computing Base] component: the setup or configuration information--the knobs and switches that … this information, including @ what installed software has … [including] shell scripts or macros; @ the database … @ network information such as lists of trusted …   Google-1   Google-2

Copyright clearance needed for quotation.

Additional Titles

Quote: security setup consists of folder structure, access control lists, group memberships, passwords, installed software, trusted machines

Related Topics up

Topic: security leaks and weaknesses (56 items)
Group: security   (23 topics, 802 quotes)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.