Which of the following should be used to assess the level of security required to protect information on a corporate network?
A. Data classification
B. Business intelligence
C. Access rights
D. Access control matrix
A. Data classification
B. Business intelligence
C. Access rights
D. Access control matrix