An EC security strategy and program begins with
A) the commitment and involvement of executive management.
B) secure design of EC applications.
C) layers of hardware and software defenses.
D) information security policies and training.
Answer: A
Quiz, Objective, Multiple Choice Question (MCQ), Test Bank Solution and Short Answers.