Other Similar Work… Is it obvious how the requested capabilities would be used? Do we need some sort of framework? Is there a need for other related documents, such as operational security guidance for enterprises, for SOHO, or for other types of devices (such as servers)? |