The goals of secure computing: confidentiality, integrity, availability
The threats to security in computing: interception, interruption, modification, fabrication
Controls available to address these threats: encryption, programming controls, operating systems, network controls, administrative controls, law, and ethics