This is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them.


  • that unauthorised attackers from outside the service provision boundary may disrupt e-Government services by bypassing boundary protection 129 For example, identity and address details of "at risk" groups who may be in need of emergency medical care. measures, attacking connected systems, attacking the internet or other relevant information environment, misusing security measures, information overload attacks, etc;

Email this to a friend.
Previous itemNext item.


(You must give a valid email address, but it will not be displayed to the public.)

We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site