In the context of authentication techniques for isaca video

 ·  PT1H46M27S  ·  EN

cisa video for in the context of authentication techniques for EDI systems, why authentication is a must and should be treated with attention?

Full Certification Question

In the context of authentication techniques for EDI systems, why authentication is a must and should be treated with attention?