Discuss the importance of having adequate resources.
What will be an ideal response?
Once all required components have been identified, it is then necessary to estimate whether what has been proposed can be implemented within the real-world resources that the organization has allocated for that solution. A lot of security systems fail because they are not feasible within the resources available to execute them, or are just technically infeasible. Consequently, the viability of the solution within resource constraints has to be confirmed. That requires the company to estimate all of the resources required in order to both establish as well as maintain the desired level of security. It also requires planners to look at how the technology is progressing, in order to ensure that whatever technologies will be required in the future will be available.
You might also like to view...
A text box can have ____, which allow you to view any information not currently showing in the control.
A. scroll bars B. view bars C. scroll handles D. highlight bars
A(n) ____________________ is the smallest square of color used to display an image on a computer screen.
Fill in the blank(s) with the appropriate word(s).
____________________ are instructions that tell Apache how to run.
Fill in the blank(s) with the appropriate word(s).
________ a disk drive increases the speed with which the disk accesses and retrieves data
Fill in the blank(s) with correct word