State a security requirement that is not realistic. State a security requirement that is not verifiable. State two security requirements that are inconsistent
What will be an ideal response?
Not
realistic:
Zero
downtime,
no
confidentiality
loss,
perfect
security.
Not
verifiable:
Reject
all
and
only
the
potentially
harmful
traffic.
Maximum
protection
of
privacy.
Inconsistent:
Full
auditing
of
users'
actions;
cannot
be
used
to
harm
users'
privacy.
Computer Science & Information Technology
You might also like to view...
The space between text and the left, right, top, and bottom of the paper in Word is called the header and footer
Indicate whether the statement is true or false
Computer Science & Information Technology
A ______ can be used to store global information about a linked list.
a) head record b) tail reference c) precede reference d) dummy head node
Computer Science & Information Technology