Discuss the importance of having adequate resources.

What will be an ideal response?


Once all required components have been identified, it is then necessary to estimate whether what has been proposed can be implemented within the real-world resources that the organization has allocated for that solution. A lot of security systems fail because they are not feasible within the resources available to execute them, or are just technically infeasible. Consequently, the viability of the solution within resource constraints has to be confirmed. That requires the company to estimate all of the resources required in order to both establish as well as maintain the desired level of security. It also requires planners to look at how the technology is progressing, in order to ensure that whatever technologies will be required in the future will be available.

Computer Science & Information Technology

You might also like to view...

A text box can have ____, which allow you to view any information not currently showing in the control.

A. scroll bars B. view bars C. scroll handles D. highlight bars

Computer Science & Information Technology

A(n) ____________________ is the smallest square of color used to display an image on a computer screen.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____________________ are instructions that tell Apache how to run.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ a disk drive increases the speed with which the disk accesses and retrieves data

Fill in the blank(s) with correct word

Computer Science & Information Technology