| Security | |
- Users are protected against other users
- Users are protected against external agents
- Communications mechanisms are protected against snooping
- Communications mechanisms are protected against tampering
- Management has adequate access to user and system data
Slide 15 | ©Copyright 1997 | Jan Newmarch |