Question

A strategy that views EC security as the process of preventing and detecting unauthorized use of the organization's brand, identity, website, e-mail, information, or other asset and attempts to defraud the organization, its customers, and employees best describes

A) feasibility assessment.

B) EC security strategy.

C) information systems security plan.

D) disaster recovery plan.

Answer

This answer is hidden. It contains 1 characters.