Three key objectives that are at the heart of computer security are: confidentiality, availability, and _________ .
What will be an ideal response?
INTEGRITY
Business
You might also like to view...
What is slice-and-dice capability?
A. Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information B. The ability to look at information from different perspectives C. Enables users to get details, and details of details, of information D. Finds the inputs necessary to achieve a goal such as a desired level of output
Business
List and briefly describe the four customer types based on their levels of satisfaction and loyalty
What will be an ideal response?
Business