Watch this video on YouTube
Which of the following is a key consideration when implementing security controls for an information system?