To implement the security policy, the security officer chooses the action to be taken in the event of particular types of attacks, such as, for example, one of: ???allow,??? ???block,??? or ???remove sensitive information and allow,??? and one of: ???log??? or ???do not log.???