ABSTRACT

Just as pieces on a chessboard have specific strengths and limitations, so it is with security technologies. This makes it doubly important for them to be used in the most effective manner for their intended function; it does no good to use a pawn to protect a king if you are faced with a checkmate situation where you really need the capabilities of a knight or bishop.