Actually it can be - but again it IS dependent onHow do you ensure all 'authorized' access is secured? A lot of time the security breach is more severe from inside ves outside.
requirements. A database sitting on a single machine
within a radio-shielded enclosure or SCIF with very
tight access controls. Result: No unauthorized
access, no emanations.