Lecture 26: security overview
Security concepts
trust/trustworthiness/trusted computing base
threat model
Some attacks
trojan horse, login spoofing, worm, virus
Gold standard
authentication, authorization, audit