Authentication

Security design considerations

In the previous post ()we learned that when planning a security budget we have to deal with hidden costs, assets, process and a good quote of dealing with higher management. The goal is to reach at least the mTCoS as i called it. Now the problem I pointed out is that in order to define this target value we have to asset risks and rank them to be able to make choices. This is a quite interesting topic per se, since it is still object of studies. I have seen several models to address the question, all have pro and…

Posts navigation