1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
2 years ago
15

The three main objectives of information security are.

Computers and Technology
1 answer:
kotykmax [81]2 years ago
8 0

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

You might be interested in
Cursor/Blinking line is used to show current_ on document. A- Color b- Status c- Type d- Location
Natalija [7]

Answer:

d. Location

Pretty sure this is it.

7 0
3 years ago
Creative Commons Question -- At home, you created a really great digital song, audio jingle, or music track using some software
galina1969 [7]
C. It's honestly up to the user, upload so others can use it or make it so its copyrighted and make some cash :P
6 0
3 years ago
You have installed Windows Server 2016 on a new server and want to centralize user logons and security policies. What type of so
shusha [124]

Answer:

Directory Service

Explanation:

3 0
2 years ago
Online dictionaries are a type of​
kap26 [50]

Answer:

learning tool. i may be wrong

Explanation:

8 0
3 years ago
Where is the "delete account" button in my profile? And please give me a legit answer and not just a word.
N76 [4]

Answer:

in your profile for brainley ??

3 0
3 years ago
Read 2 more answers
Other questions:
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • A(n) ____ is a user interface that allows users to interact with graphical objects and pointing devices.
    13·1 answer
  • What provides quality education for students
    14·1 answer
  • ________ is a remote access client/server protocol that provides authentication and authorization capabilities to users who are
    10·1 answer
  • For each 8-bit data frame the layer uses a generator polynomial G(x) = x4+x2+ x+1 to add redundant bits. What is the sequence of
    11·1 answer
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • Please help ASAP! will mark brianliest! 30 points!
    14·1 answer
  • A natural language processor reads the sentence The walk was tiring and mistakes the noun “walk” as a verb. What is such an erro
    13·1 answer
  • Write a format operation that builds a string for the float variable amount that
    11·1 answer
  • How to use emojis on chromebook without on-screen keyboard
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!