An analysis of the current security controls against recent security activity to determine if the existing controls are adequate.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.