Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Let me begin by describing a number of problem scenarios in which I would like you to pick a possible solution to the problem (there is no definitive answer just degrees of accuracy).

Scenario 1: Your organisation has a number of computers, PCs and laptops.  The laptops have been specially configured to meet your organisation's needs.  The configurations consist of a set of security modules, encryption modules, specialist modelling applications and some office products.  The hardware has been augmented to enhance the security features on the machines.  

...