Designing security in at the start of system definition and design, rather than adding it later, has long been accepted wisdom. Sadly system security has often been found to be deficient, and attempts to add improvements later have often proved to be disastrous.
Members-Only Content
This content is restricted to members only.
You must be logged in with an active membership to access this page.
Please click the link below to log in. If you do not have an account or your membership is inactive, you may need to register or renew it.