- What can the intruder see on the target system?
- What can intruder do with that information?
- Does anyone at the target notice the intruder's attempts or successes?
- If all the components of information system are adequately protected, updated and patched
- How much effort, time, and money is required to obtain adequate protection?
- Does the information security measures are in compliance to industry and legal standards?
No comments:
Post a Comment