- that unauthorised attackers from outside the service provision boundary may
disrupt e-Government services by bypassing boundary protection
129 For example, identity and address details of "at risk" groups who may be in need of emergency medical
measures, attacking connected systems, attacking the internet or other relevant
information environment, misusing security measures, information overload
Email this to a friend.
Previous item —