slides03.tex
changeset 35 7dd341037669
parent 33 e9288308dbcf
child 37 31e879c6cbc1
--- a/slides03.tex	Tue Oct 09 20:30:06 2012 +0100
+++ b/slides03.tex	Tue Oct 09 20:34:52 2012 +0100
@@ -495,7 +495,7 @@
 \frametitle{\begin{tabular}{@ {}c@ {}}Security Levels (2)\end{tabular}}
 
 \begin{itemize}
-\item Bell --- La Pudela preserves data secrecy, but not data integrity\bigskip\pause
+\item Bell --- La Padula preserves data secrecy, but not data integrity\bigskip\pause
 
 \item Biba model is for data integrity  
 
@@ -688,7 +688,7 @@
 
 {\bf How well does the security solution mitigate those risks?}\bigskip
 
-Another seemingly obvious question, but one that is frequently ignored. If the security solution doesnŐt solve the problem, itŐs no good. This is not as simple as looking at the security solution and seeing how well it works. It involves looking at how the security solution interacts with everything around it, evaluating both its operation and its failures.
+Another seemingly obvious question, but one that is frequently ignored. If the security solution doesnŐt solve the problem, it's no good. This is not as simple as looking at the security solution and seeing how well it works. It involves looking at how the security solution interacts with everything around it, evaluating both its operation and its failures.
 
 \end{frame}}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%