This is a dedicated watch page for a single video.
Ratio Corp is in the process of selecting security controls for a new information system. The system will be used to process credit card transactions, and the organization wants to ensure that the data is protected from unauthorized access or modification. Which of the following security controls is most appropriate for this scenario?