When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
Type of data contained in the process/system
Type of connection/protocol used to transfer the data
Type of encryption required for the data once it is at rest
Type of computer the data is processed on
Submit