Which of the following is suitable as a description of “preventive” functions in approaches to secure computing?
a) Checking an access log and monitoring for illegal accesses.
b) Establishing a contingency plan and implementing training.
c) Periodically backing up important files.
d) Implementing in-house security education to increase individual awareness.