The Management of Security
So far the discussion has been centred mainly on the various techniques one can employ to counter various security threats. Good security consists of rather more than the mere application of countermeasures. It is thought by many people that the answer to any security problem is to apply every available countermeasure. The supposed advantage of this approach is that it covers every eventuality.
KeywordsSecurity Policy Security Requirement Vulnerability Index Security Threat Security Problem
Unable to display preview. Download preview PDF.