Comparison would be most suitable. I hope I could be a help
Answer:
(1) Protecting the privacy of personal data and proprietary information
(2) Proprietary Information
These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon
(1) Disaster Recovery Policy
(2) Acceptable Use Policy
(3) Business Continuity plan
Answer:
They
are indirectly involved in the attack because they do not verify the the MAC/IP address
association
Explanation:
PLEASE MARK ME AS BRAINLIEST