Which of the following is NOT an element that should be included in your plan of securing the network (Choose two)?
A.
Risk Assessment
B.
Vulnerability
C.
Budget Analysis
D.
Security Policy
E.
Implementation
F.
Auditing
G.
Cyber Crime investigation
H.
Court procedures