Security Architecture
To enhance the security of information systems, enterprises are developing and adopting information system management systems. However, if an information management system is exploited, applications and the data they contain will be compromised. Therefore, it is important to performa comprehensive securityanalysis throughout the enterprise. In your own words explain (a) the purposeof an security analysis, and (b) using fig 2.2 (“Knowledge sets that feed a […]