Which of the following should an IS auditor recommend for the protection of specific sensitive information stored in the data warehouse?
Which of the following should an IS auditor recommend for the protection of specific sensitive information stored in the data warehouse?
What would be the MOST effective control for enforcing accountability among database users accessing sensitive information?
What would be the MOST effective control for enforcing accountability among database users accessing sensitive information?
Which of the following intrusion detection systems (IDSs) monitors the general patterns of activity and traffic on a network and creates a database?