Operation Security-12

Using the attached scenario, identify four possible IT security controls for the bank and provide rationale for your choices.