troyisbeast4246 troyisbeast4246 12-12-2022 Computers and Technology contestada Information security policies would be ineffective without _____ and _____.