Which of the following are the essential ingredients of…
In this situation an information security manager should: