In this chapter, we looked briefly at the questions that underlie
computer security. What is computer security, and what are the
threats to it? What is an operating system? What is a deployment
environment? In the rest of the book, we'll explore all of these
questions and your role in trying to answer them.