Your browser doesn't support the features required for this presentation, so you are presented with a simplified version.
For the best experience please use the latest Chrome, Safari or Firefox browser.
Who can access what and how?
Creating mechanisms to enforce this
Security doesn't exist on its own; needs to be applied in a context
Security: hypothetical
Help enforce the security requirements
Understand if something is secure
Forensics: historical
Who accessed what and how?
Often circumventing security
Use a spacebar or arrow keys to navigate