
25 Jun
2009
25 Jun
'09
12:11 p.m.
just a question, as the discussion is kind of confusing but interesting. What are we defending or evaluating against or why would the cid need such a system? imho, any security threat is evaluated on a need be basis as there is no golden rule that would work for any given situation. Each level below has a defensive system. a) Hardware level b) Software level c) Network level d) Physical level.