Cyber-Security Discussion
ITSEC covers the security evaluation of systems. Consultants advise clients on solutions to their problem. Where would you draw the boundary between consultancy and evaluation? Does evaluation have any advantage over contracting consultants?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.