· Supplemental Readings:
“The Protection of Information in Computer Systems”, Jerome Saltzer and Michael Schroeder, IEEE
· There is just one topic this week for the discussion.
Review the supplemental reading material linked above. Pick one of the concepts discussed in the documents and explain it in your own words. Include an example of that concept that explains it in real-world terms. Provide how it applies in today’s cyber-world and how it ties to the IT Strategic or Tactical plans.
Feel free to play devil’s advocate and challenge each other.
I wanted to do it in:
Security Oriented Computing
Please let me know if you need more clarification