__________ assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
A. Availability B. System Integrity
C. Privacy D. Data Integrity
C. Privacy
Computer Science & Information Technology
You might also like to view...
Define each of the following: spyware, adware, cookie, spam, and phishing.
What will be an ideal response?
Computer Science & Information Technology
When using the Common Internet File System (CIFS), which security model will require network users to have a user name and password to access a specific resource?
A. NT level security B. Share-level security C. User-level security D. CIF level security
Computer Science & Information Technology