Security

Previous Topic Next Topic

Threats, Vulnerabilities, and Attacks

When considering the security of a system you will need to determine all the possible threats, vulnerabilities, and attacks. You will also need to consider the appropriate tradeoffs between security on one hand, and usability and cost on the other. For more information, see “The Bottom-Line Cost of Security” later in this section.

See the following:


© 1997-1999 Microsoft Corporation. All rights reserved.