Question

How is the CNSS model of information security organized?