Next, the insider attack test: How much damage could a corrupt insider cause? Lastly, the trusted computing base test: How much code must be trusted for security to hold?