Confidentiality, Integrity, and Availability form what is often referred to as the _____.
Fill in the blank(s) with the appropriate word(s).
CIA triad
Computer Science & Information Technology
You might also like to view...
By default, documents with the file extension of .bmp open in ________
A) Microsoft Paint B) File Explorer C) Excel D) WordPad or Word
Computer Science & Information Technology
Describe wireless personal area networks.
What will be an ideal response?
Computer Science & Information Technology