Discussion: Operation Security
In general, how can you build trust in the digital age? What should you ask for to gain confidence that a vendor's security controls are adequate? How do security policies help build those controls?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.