Arm provides secure compute platforms for a range of security-focused applications. This guide introduces some generic concepts about security.
This guide is a primer for some other guides in this series, and provides context for those guides that discuss specific security-related technologies.
This guide is a high-level introduction only. You can find third-party books and guides on this subject if you want to learn more.
At the end of this guide you will be able to:
- Define confidentiality, integrity, and authenticity, and give practical examples
- Explain the categories into which attacks are split
- Understand how different techniques are used to protect different aspects of a security system