First page Back Continue Last page Overview Graphics
Operating systems control the interactions between subject and objects
Because security appears in every aspect of the operating system the design and implementation of security components cannot be left vague or untested until the rest of the system is working.
- It is encredibly difficult to succesfully retrofit security abilities.
Notes: