If we have centralized control of access in an organization,
from C-I-A (Confidentiality, integrity, availability) perspective,
which item will be difficult to enforce? (b) One of the
realities of the modern Internet is that new network
vulnerabilities will be discovered almost daily. You can also count
on those vulnerabilities being exploited soon after they are found.
An entire industry is growing and profiting from these discoveries,
whether they are used maliciously or used to lead to the prevention
of future...