Security threats
Unauthorised access
Disclosure of information
Modification of information
Denial of service
Slide 2
©Copyright 1997
Jan Newmarch