Why is it important to clearly define where the security scheme will apply?

What will be an ideal response?


It is important to define clearly where the security scheme will apply, because whatever countermeasures that will be deployed will demand resources. The greater the extent of the protected space, the greater the resource requirements. Documenting the scope of the protected space involves clarifying such practical issues as detailing the specific aspects of the operation that will be secured, who should be responsible for carrying out each of the security functions within the protection scheme, what reporting lines will be followed, and who will eventually be accountable for the overall success of the process.

Computer Science & Information Technology

You might also like to view...

In the fragment below, what is the minimum size of result required for successful and valid concatenation of "double " and "trouble"?

``` strcpy(result, "double"); strcat(result, "trouble"); ``` a. 10 b. 13 c. 14 d. 15 e. none of the above

Computer Science & Information Technology

The endl item is an example of an escape sequence.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A data structure in which the elements are added and removed from one end only is known as a ____.

A. queue B. deque C. hash table D. stack

Computer Science & Information Technology

What is the first step of the troubleshooting theory?

A. Identify the problem. B. Establish theory of probable cause. C. Test the theory. D. Verify full system functionality.

Computer Science & Information Technology