1 research outputs found
Encapsulating Rules of Prudent Security Engineering
In practice, security of computer systems is compromised most often not by breaking dedicated mechanisms (such as security protocols) , but by exploiting vulnerabilities in the way they are employed