There are points in a system's life cycle that serve as milestones for security management. Which of the following is a valid milestone?
a) When the operating system or application software is installed
b) When a user initially uses a newly installed application
c) When exiting an application
d) When temporarily stopping a service