First page Back Continue Last page Summary Graphic
Hardware and Software Security
Identification measures to identify authorized users
Isolation features to restrict access to unauthorized devices, software and data
Access control for selective sharing of system resources
Surveillance and detection measures
Response techniques to counter harm