are included in a system to ensure that unauthorised access to the system and its data is not allowed and to ensure the integrity of the system form accidental or malicious damage.
As system become distributed and connected to external network, security requirements are becoming more and more important.