Which of the following is the priority of data owners when establishing risk mitigation method?
A. User entitlement changes
B. Platform security
C. Intrusion detection
D. Antivirus controls
A. User entitlement changes
B. Platform security
C. Intrusion detection
D. Antivirus controls