Which of the following is the MOST important consideration when investigating a security breach of an e-commerce application?
A. Chain of custody
B. Skill set of the response team
C. Notifications to law enforcement
D. Procedures to analyze evidence
A. Chain of custody
B. Skill set of the response team
C. Notifications to law enforcement
D. Procedures to analyze evidence