16 September 2019
Security means attack, attack means value. Value can require different constraints: confidentiality, integrity and availability. Value can be the name and contact details of your providers. Potentially, it is not so confidential because it is directly visible on your product, but the integrity and availability of these data is key for the efficiency of your process.
On the other side, your list of customers is surely confidential because it has a unique value for your competitors.
1 results on 1 pages