Chapter 5 Copyright Pearson Prentice-Hall 2009 Copyright Pearson Prentice-Hall 2010 If attackers cannot get access to your resources, they cannot attack them This chapter…