_________ security, also called infrastructure security, protects the information systems that contain data and the people who use, operate, and maintain the systems

What will be an ideal response?

Physical

Business

You might also like to view...

Which of the following is not a personal interview method?

A) in-home B) mall intercept C) computer-assisted personal interview (CAPI) D) e-mail

Business

Explain the shell company fraud

Business