_________ is a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity, and reliability.

Fill in the blank(s) with the appropriate word(s).

IT security management

Computer Science & Information Technology

You might also like to view...

If you want to resize just a few controls on a form they must be removed from the Layout control

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____ statement always creates a posttest loop.

A. while B. do-while C. for D. repeat-until

Computer Science & Information Technology