1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
2 years ago
15

The three main objectives of information security are.

Computers and Technology
1 answer:
kotykmax [81]2 years ago
8 0

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

You might be interested in
What is a quick way to determine if a site might contain reliable information?
xz_007 [3.2K]
<span>The best and most correct answer among the choices provided by the question is the fourth choice.

A way of determining that a site is realiable is examining comments about the <span>webpage.</span></span><span>
I hope my answer has come to your help. God bless and have a nice day ahead!</span>
5 0
3 years ago
Read 2 more answers
A ________ infrastructure is a framework that consists of programs, procedures,and security policies and employs public key cryp
Norma-Jean [14]

Answer:

The answer is "Public Key".

Explanation:

PKI stands for public key infrastructure. It is a collection of functions, protocols, equipment, code, and procedures that require to create, maintain, transmit, store and cancel encrypted certs and handle the authentication of a public key.  

  • It is used to sign documents digitally.
  • It works for propagating with Trojans and other malware.
5 0
3 years ago
How would you create a loop that never ends?
34kurt

Answer:

the answer is d use the forever block

Explanation:

I took the test and I got it right but sometimes it is different for others

8 0
2 years ago
The study of how to design software, solve problems such as computer security threats, or come up with better ways of handling d
Gnom [1K]

Computer engineering

3 0
3 years ago
The following is a mock-up of a Battleship game board. The square with a X marks the position of a battleship.
Verizon [17]

Answer:

Row B column 2

Explanation:

X is directly underneath column 2 and the row is B

3 0
2 years ago
Other questions:
  • Which of these is not a modifier?<br><br> short<br><br> unsigned<br><br> nest<br><br> long
    15·1 answer
  • James has been asked to build a low-profile computer for his friend to use as a home theater system. James needs to choose parts
    15·1 answer
  • Which type of JPEG image records the most information in the digital file? Medium Low Fine Expert
    6·2 answers
  • The labels button is found under the
    7·2 answers
  • "what type of index has an index key value that points to a data row, which contains the key value? "
    9·1 answer
  • Discuss different types of data?[At the language of computer information and technology system]
    14·1 answer
  • Misspelet errors are displays with a ...<br>.. below them<br>​
    10·1 answer
  • HELP PLSSS I WILL MARK U!!!!
    10·2 answers
  • Which command tells the for loop what to count by?
    9·2 answers
  • patty works at Mcdonald's as a chef. it is her job to make hamburgers as each order arrives on her computer screen. one day patt
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!