which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?
a. "Benchmarking" b. "Algorithms" c. "Controls" d. "Security"