Information security policies should:
A.
address corporate network vulnerabilities.
B.
address the process for communicating a violation.
C.
be straightforward and easy to understand.
D.
be customized to specific groups and roles.
Information security policies should:
Information security policies should:
A.
address corporate network vulnerabilities.
B.
address the process for communicating a violation.
C.
be straightforward and easy to understand.
D.
be customized to specific groups and roles.