Mechanisms exist to train personnel to detect counterfeit system components, including hardware, software and firmware.
Does the organization train personnel to detect counterfeit system components, including hardware, software and firmware?