ABSTRACT
A third technique for meeting security objectives is
referred to as tolerance. Every practical system tolerates
some degree of risk with respect to potential security
breaches; however, it is important to understand which
risks are being tolerated and which are covered by preven-
tive and detective mechanisms.