The cybersecurity defense strategy and controls that should be used depend on __________. Select one: a. The source of the threat b. Industry regulations regarding protection of sensitive data c. What needs to be protected and the cost-benefit analysis d. The available IT budget

Respuesta :

Answer:

The answer is "Option C"

Explanation:

It is an information warfare-security method, that consists of a set of defense mechanisms for securing sensitive data. It aimed at improving state infrastructure security and stability and provides high-level, top-down, which lays out several new goals and objectives to be met within a certain timeline, and incorrect options can be described as follows:

  • In option a, These securities can't include threats.
  • Option b, and Option d both are incorrect because It is used in industry but, its part of networking.