Check This


  • The accompanying table provides you with a way to check the various kinds of security discussed in this chapter. How do you fare?

Type of Security

Assessment

Digital identity management

How much security is needed?

Why do you think you need it?

How have you addressed this need?

 

Transaction security

How much security is needed?

Why do you think you need it?

How have you addressed this need?

 

Software security

How much security is needed?

Why do you think you need it?

How have you addressed this need?

 

Information security

How much security is needed?

Why do you think you need it?

How have you addressed this need?

 


Beyond Software Architecture[c] Creating and Sustaining Winning Solutions
Beyond Software Architecture[c] Creating and Sustaining Winning Solutions
ISBN: 201775948
EAN: N/A
Year: 2005
Pages: 202

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net