brinjay8556 brinjay8556 Today at 1:55 PM Computers and Technology Answered If indirect access to sensitive data can be achieved through a system, what should be considered when evaluating the critical system functionality?