ABSTRACT

A third technique for meeting security objectives is

referred to as tolerance. Every practical system tolerates

some degree of risk with respect to potential security

breaches; however, it is important to understand which

risks are being tolerated and which are covered by preven-

tive and detective mechanisms.