Arm provides secure compute platforms for a range of security-focused applications. This guide introduces some generic concepts about security.

This guide is a primer for some other guides in this series, and provides context for those guides that discuss specific security-related technologies.

This guide is a high-level introduction only. You can find third-party books and guides on this subject if you want to learn more.

At the end of this guide you will be able to:

  • Define confidentiality, integrity, and authenticity, and give practical examples
  • Explain the categories into which attacks are split
  • Understand how different techniques are used to protect different aspects of a security system