Which of the following describes how individuals are expected to follow security policy rules?
a. Security definition
b. Auditing
c. Enforcement
d. Authorization