An information security manager wishing to establish security baselines would:
A. include appropriate measurements in the system development life cycle.
B. implement the security baselines to establish information security best practices.
C. implement the security baselines to fulfill laws and applicable regulations in different jurisdictions.
D. leverage information security as a competitive advantage.
A. include appropriate measurements in the system development life cycle.
B. implement the security baselines to establish information security best practices.
C. implement the security baselines to fulfill laws and applicable regulations in different jurisdictions.
D. leverage information security as a competitive advantage.