The goal of information security is to protect the integrity, ____, and availability of data on the devices that store, manipulate, and transmit the information.
A. authorization
B. authentication
C. confidentiality
D. accounting
Answer: C
Computer Science & Information Technology
You might also like to view...
In PowerPoint Online, notes are entered in the Notes ________ that displays below the current slide in the Editing view of a presentation
Fill in the blank(s) with correct word
Computer Science & Information Technology
Select the example below that could be used to clear a right float
a. clear: right; b. clear: left; c. right: clear; d. overflow: right;
Computer Science & Information Technology