Figure 1-1
This illustration depicts an overview of the computing environment and shows the different aspects of the environment that need protection. Databases and the servers on which they reside, the rights of internal database users, and the confidentiality of electronic commerce customers all need the protection of computer security.