There are four fundamental requirements for a successful, secure transaction: privacy, integrity, authentication and_______.
a) restricted environment.
b) security.
c) nonrepudiation.
d) none of the above.
c) nonrepudiation.
Computer Science & Information Technology
You might also like to view...
A(n) ____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) ________ character is a special character that designates the end of a line in a CSV file.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology