ABSTRACT
This chapter provides a brief overview of security and privacy. Our goal is to define the terms we need later in the book and give a brief technical overview before discussing the technical details beginning in Chapter 3. At the end of this chapter, the reader should understand:
Computer and
• The different levels of security a system can have, • Common vulnerabilities and exploits, and • How attackers can combine vulnerabilities and exploit them to accomplish a larger goal.