The method to provide end users of IT systems and applications with requirements related to
acceptable use, privacy, new threats and trends, and use of social networking is:
A.
Security awareness training.
B.
BYOD security training.
C.
Role-based security training.
D.
Legal compliance training.