Your company s computers have been taken over by an attacker andused to attack other organization s information systems. Yourproblem is which of the following?A. poor security policies and proceduresB. lack of due diligenceC. downstream liabilityD. poor service-level agreementsE. users have a lack of information security awareness