This book addresses the broad sweep of issues above; the nature of the threat and system vulnerabilities (Chapter 1); Cryptography (Chapter 2 and 12); software vulnerabilites (Chapter 3); the Common Criteria (Chapter 5); the World Wide Web and Internet (Chapter 4 and 6); managing risk (Chapter 10); and legal, ethical and privacy issues (Chapter 11) .