For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()
- AStrategic security planning
- BDisaster recovery
- CImplementation security
- DOperations security