Which of the following is MOST effective against external threats to an organization’s confidential information?
A. Single sign-on
B. Strong authentication
C. Data integrity checking
D. Intrusion detection system
A. Single sign-on
B. Strong authentication
C. Data integrity checking
D. Intrusion detection system