Read time: 3 minutes

What are the 3 types of software security?