We proceed by clarifying observations that form the basis of this proposed technique. A digital operation is assumed to occur through software. Software is composed
of two resources called code and data. The operations performed on these resources are as follows.
Therefore, we conclude that a proper security strategy should protect four operations - code execution, resource processing, resource transmission, and resource
reception. We describe code and data in the following manner. Data is a resource that lacks any type of computer instructions. Code is a resource that contains any
type of computer instructions. This definition promotes proper control that accurately quantifies necessary operations. This is the key to providing absolute security.
All sections of the website are consistent with this pattern. We now reveal the digital security solution that applies these observations.
|