¨Define
and describe “subsystems”
¨Describe
security functions provided by each subsystem
¨Describe
if and how each subsystem depends on the presences of security functions in the
external IT environment
¨Describe
interactions between subsystems
¨Externally
visible subsystem interfaces