You are creating an information security policy for your company. Which of the following activities
will help you focus on creating policies for the most important resources?
A.
Auditing the firewall
B.
Implementing non-repudiation
C.
Logging users
D.
Classifying systems