The goal of information security is to protect the integrity, ____, and availability of data on the devices that store, manipulate, and transmit the information.

A. authorization
B. authentication
C. confidentiality
D. accounting

Answer: C

Computer Science & Information Technology

You might also like to view...

In PowerPoint Online, notes are entered in the Notes ________ that displays below the current slide in the Editing view of a presentation

Fill in the blank(s) with correct word

Computer Science & Information Technology

Select the example below that could be used to clear a right float

a. clear: right; b. clear: left; c. right: clear; d. overflow: right;

Computer Science & Information Technology