•Current Solution-- SECURITY: Keep bad guys OUT
–Access control requires authentication and
authorization
–Collaborators
and Customers get into
authorized areas
•Once they are IN no further checking occurs in
computer systems
–Further checking is done when physical assets are
protected
•Examples: warehouses, even warehouse stores:
•
•
•
Privacy is entrusted to security
specialists and surrogates
•
Cryptographers: important tools, but serves binary settings
• Database
administrators: valued for making data available
• Network
administrators: keep accessibility by users