Analyzing Requirements and Defining Solution Architectures
A. The security attributes or rules that determine access to the solution and data B. The effect security features in an application have on the existing security environment C. The data and solution that are accessed D. The security attributes that determine the security environment, and keep the existing security environment from being modified in any way
A. The security attributes or rules that determine access to the solution and data
B. The effect security features in an application have on the existing security environment
C. The data and solution that are accessed
D. The security attributes that determine the security environment, and keep the existing security environment from being modified in any way