Organize the findings into a comprehensive security plan. Identify directives needed to implement the security plan.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.