After recovering from a data breach in which customer data was lost, the legal team meets with
the Chief Security Officer (CSO) to discuss ways to better protect the privacy of customer data.
Which of the following controls support this goal?
A.
Contingency planning
B.
Encryption and stronger access control
C.
Hashing and non-repudiation
D.
Redundancy and fault tolerance