“…Security countermeasures may be established for formulating an effective overall security solution to address threats at all layers of the information infrastructure (Kim & Lee, 2005). Kim and Lee (2005) propose a method for the selection of countermeasures. In their method, information value, threat level, security services, the scope of security services are considered for selection of both technical and non-technical countermeasures.…”