brinjay8556 brinjay8556 19-08-2022 Computers and Technology contestada If indirect access to sensitive data can be achieved through a system, what should be considered when evaluating the critical system functionality?