The accompanying table provides you with a way to check the various kinds of security discussed in this chapter. How do you fare?
Type of Security
Assessment
Digital identity management
How much security is needed? Why do you think you need it? How have you addressed this need?
How much security is needed?
Why do you think you need it?
How have you addressed this need?
Transaction security
Software security
Information security