When preparing a strategy for protection from SQL injection attacks, it is MOST important for the information security manager to involve:
A. senior management
B. the security operations center.
C. business owners.
D. application developers.
A. senior management
B. the security operations center.
C. business owners.
D. application developers.