Which of the following approaches can be used to build a security program? Each correct answer represents a complete solution. Choose all that apply.
A. Bottom-Up Approach
B. Right-Up Approach
C. Top-Down Approach
D. Left-Up Approach
A. Bottom-Up Approach
B. Right-Up Approach
C. Top-Down Approach
D. Left-Up Approach