Which of the following would BEST detect malicious damage arising from an internal threat?
A. Access control list
B. Encryption
C. Fraud awareness training
D. Job rotation
A. Access control list
B. Encryption
C. Fraud awareness training
D. Job rotation