After completing the first year of his security awareness program, Frank reviews the data about how many staff completed training compared to how many were assigned the training to determine whether he hit the 95 percent completion rate he was aiming for. What is this type of measure called?
In her role as a developer for an online bank, Karen is required to submit her code for test ing and review. After it passes through this process and it is approved, another employee moves the code to the production environment. What security management does this process describe?
Tom is worried that the laptops that his organisation has recently acquired were modified by a third party to include keyloggers before they were delivered. Where should he focus his efforts to prevent this?