Figure3
From: Crafting organizational security policies for critical infrastructures: an architectural approach

Figure 3. Evaluating security requirements of solution architectures.
Figure 3. Evaluating security requirements of solution architectures.
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/