https://de.ketajaman.com/post/which-of-the-following-refers-to-policies-procedures-and-technical-measures-used-to-prevent-unauthorized-access
Which of the following refers to policies procedures and technical measures used to prevent unauthorized access?