When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?
A bottom-up approach
A top-down approach
A senior creation approach
An IT assurance approach
Submit