no such thing as complete information assurance
authorAaron Kaplan <aaron@lo-res.org>
Tue, 17 Dec 2013 02:47:25 +0000 (03:47 +0100)
committerAaron Kaplan <aaron@lo-res.org>
Tue, 17 Dec 2013 02:47:25 +0000 (03:47 +0100)
src/disclaimer.tex

index 15d7aa1..58c489f 100644 (file)
@@ -5,8 +5,8 @@
 
 
 This guide specifically does not address physical security, protecting software
-and hardware against exploits, basic IT security housekeeping, complete
-information assurance, traffic analysis attacks, issues with key-roll over and
+and hardware against exploits, basic IT security housekeeping, information
+assurance techniques, traffic analysis attacks, issues with key-roll over and
 key management, securing client PCs and mobile devices (theft, loss), proper
 OPSec\footnote{\url{http://en.wikipedia.org/wiki/Operations_security}}, social
 engineering attacks, anti-tempest\cite{Wikipedia:Tempest} attack techniques,