Watch this video on YouTube
Your organization faces numerous unauthorized access attempts on its primary financial system. As the Information Security Manager, which of the following metrics would best indicate the effectiveness of your access control measures?