Which of these is NOT a primary method for controlling access to information systems?
Authentication
Encryption
Overlook minor misbehaviors
Impose harsh punishments for any infraction

Information Security Exercises are loading ...