A common mistake that people make when trying to design something completely foolproof is to underestimate the ingenuity of complete fools.110
Douglas Adams, author of The Hitchhiker’s Guide to the Galaxy
In this chapter:
Phases of the system life cycle The phases and associated documentation
When do you really have to start paying attention to security requirements for your information system? The answer is – from the very earliest stages of planning for the system to its final disposal. By considering security early in the information system life cycle (SLC)111, you might avoid ...