____ refers to the efforts taken through policy, procedure, and design in order to create and maintain the privacy and discretion of information and systems.

A. Availability
B. Confidentiality
C. Portability
D. Integrity

Answer: B

Computer Science & Information Technology

You might also like to view...

An amortization table shows the interest rate for each payment

Indicate whether the statement is true or false

Computer Science & Information Technology

Ujam is ____________ that uses ________ to produce sophisticated harmonies, bass lines, drum tracks, horn parts, etc.

A. hardware; algorithms B. hardware; instinct C. software; algorithms D. software; instinct

Computer Science & Information Technology