The ACM Computing Classification System (1991) D.4.6 Security and Protection Access controls Authentication Cryptographic controls Information flow controls Invasive software (e.g., viruses, worms, Trojan horses) Security kernels Verification