Slide 1 Information Systems Security Information Security & Risk Management Slide 2 Core Principles Confidentiality – only authorized nodes have access to information…
Overview Implications of the Judgment The CFIâs analysis of Microsoftâs refusal to supply interoperability information The CFIâs analysis of Microsoftâs tying Concluding…