University of Victoria

e.g.) ACL(Access Control Lists), Linux permission bits etc - Accounting : Tracking of data/comp./netwrk resources usage for individuals. e.g.) Logging, auditing, data/network monitoring. Types of Threats - Malicious Software - Unauthorized Access - System Failure - Social Engineering. Physical, Technical, Administrative Security plans ................
................