An ideal cybersecurity program should include which of the following points?
O Common information and computer system security vulnerabilities
O Different types of cryptographic algorithms
O Firewalls and other means of intrusion prevention
O All of the above