Topic: security leaks and weaknesses
Group: security
| |
Quotation Skeleton
Security setup … takes time, and it contributes nothing to useful … or an attack. … [p. 39] The setup is all the data that … and so on. … [p. 40] Although most discussion of assurance focus on … [Trusted Computing Base] component: the setup or configuration information--the knobs and switches that … this information, including @ what installed software has … [including] shell scripts or macros; @ the database … @ network information such as lists of trusted …
Google-1
Google-2
Copyright clearance needed for quotation.
Additional Titles
Quote: security setup consists of folder structure, access control lists, group memberships, passwords, installed software, trusted machines
|
Related Topics
Topic: security leaks and weaknesses (56 items)
Group: security (23 topics, 802 quotes)
|