Which of the following would be the MOST important factor to be considered in the loss of mobile equipment with unencrypted data?
Which of the following would be MOST relevant to include in a cost-benefit analysis of a two-factor authentication system?