ABSTRACT

This chapter provides a brief overview of security and privacy. Our goal is to define the terms we need later in the book and give a brief technical overview before discussing the technical details beginning in Chapter 3. At the end of this chapter, the reader should understand:

Computer and

• The different levels of security a system can have, • Common vulnerabilities and exploits, and • How attackers can combine vulnerabilities and exploit them to accomplish a larger goal.