Outline for May 26, 2006
Reading: text, §22.3—22.6, 18.1—18.2.1
- Greetings and felicitations!
- Types of malicious logic
- Computer viruses
- Computer virus theory and undecidability
- Assurance and Trust
- Why assurance?
- Role of requirements
- Assurance throughout life cycle
- Building secure and trusted systems
- Life cycle
Version of May 26, 2006 at 12:20 PM
You can also obtain a PDF version of this.