Operation security-12

Using the attached scenario, identify four possible IT security controls for the bank and provide rationale for your choices.

Tags: No tags