Confidentiality, Integrity, and Availability form what is often referred to as the _____.

Fill in the blank(s) with the appropriate word(s).

CIA triad

Computer Science & Information Technology

You might also like to view...

By default, documents with the file extension of .bmp open in ________

A) Microsoft Paint B) File Explorer C) Excel D) WordPad or Word

Computer Science & Information Technology

Describe wireless personal area networks.

What will be an ideal response?

Computer Science & Information Technology