A company wants to protect its IT system from unauthorized users accessing the system. Which of the following controls would best serve to mitigate this risk?
A. A keystroke log.
B. A transaction log.
C. A biometric device.
D. Public key encryption.