Discuss the administrative, technical and physical security controls that protect information systems and organizations. Describe how you would apply this to the healthcare implementations occurring in Saudi Arabia.
be sure to draw from, explore, and cite credible reference materials