An ideal cybersecurity program should include which of the following points? O Common information and computer system security vulnerabilities O Different types of cryptographic algorithms O Firewalls and other means of intrusion prevention O All of the above