For the following attempts, which one is to ensure that no one employee becomes a pervasive security threat, that data can be recovered from backups, and that information system changes do not compromise a system’s security?
A.
Disaster recovery
B.
Strategic security planning
C.
Implementation security
D.
Operations security