The first step in managing it security is to develop a _____ based on confidentiality, integrity, and availability.​
a. ​risk policy
b. ​security policy
c. ​threat report
d. ​concealment report