The
of the security team produce the desired results based on the plans.
Select one:
a. Framework
O b. Actions
C. Authority
d. Assessment
Answers
Answered by
0
Explanation:
Introduction to Security Management
Because system security is the aggregate of individual component security, "system boundaries" must encompass individual users and their workstations. But because personal computers are just that (personal), staff behavior can't always be dictated without potentially hampering workers' overall
Similar questions