an intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the company’s business. however, when attempting to access the drive’s contents, the intruder is met with the company’s authentication protocols and data encryption measures. what type of security is illustrated in this example?

A. data security
B. cyber intelligence
C. governance
D. product security

prawin Changed status to publish March 9, 2023