a. Why is defense in depth important? b. Distinguish between defense in depth and weakest-link problems. c. Why are central security management consoles dangerous? d. Why are they desirable? e. Why is it important to minimize the burdens that security places on functional units in the firm? f. Why do you think it is important to have realistic goals for reducing vulnerabilities?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here