An it company commissions a new software for Human Resources [HR) management. This new software replaces a legacy software used in the organization for around 20 years. Which of the following security practices are important to prevent data leaks during the decommissioning of the legacy HR software? (Select TWO correct options)
a) Build and execute a disposal/transition plan
b) Sanitize media
c) Threat modeling
d) Final security review