1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
2 years ago
15

The three main objectives of information security are.

Computers and Technology
1 answer:
kotykmax [81]2 years ago
8 0

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

You might be interested in
Who plays Counter blox or counter strike
abruzzese [7]

Answer:

me

Explanation:

csgo

8 0
3 years ago
Read 2 more answers
What is the potential outcome for an author if she uses a word without realizing its connotation? she may write something that s
zubka84 [21]

A potential outcome for an author who uses a word without realizing its connotation is: A. she may write something that she does not mean.

<h3>What is connotation?</h3>

Connotation refers to the quality, feeling or an idea which a word brings to the mind of a reader or listener, as well as its literal, dictionary or primary meaning.

This ultimately implies that, a potential outcome for an author who uses a word without realizing its connotation is that he or she may write something that she does not mean or pass across an information she didn't intend to.

Read more on connotation here: brainly.com/question/20236939

#SPJ1

3 0
2 years ago
Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
Misha Larkins [42]

Answer:

By using a virtual private network (VPN)

Explanation:

If Randy deploys a virtual private network (VPN), it will give the sales department online privacy since VPN encrypt connections whenever the sales department connects to the company network over the Internet. A VPN for the sales department is very necessary to use over a cellular data signal to ensure the department's overall digital defense, and it also has other uses.

7 0
3 years ago
What are concepts and accrual​
Darya [45]

Answer:

umm oh nvrm i forgot

Explanation:

4 0
3 years ago
Read 2 more answers
If you want smaller tables to fit on a single page?
Vinil7 [7]
Well what i do is i make every thing a little smaller and if that dose not work make it bigger so that it just gos over the bottom of the page
8 0
3 years ago
Other questions:
  • What is the value of the variable result after these lines of code are executed?
    5·2 answers
  • If you want to copy a file from one folder to another , what would you do?
    15·1 answer
  • What is the rationale behind the development of an operating system in computing?
    15·1 answer
  • How can I crack a computer password?
    10·1 answer
  • Conduct online research on web authentication and define what it is. Describe different authentication methods
    5·1 answer
  • Select which is true for for loop​
    11·1 answer
  • Select the correct answer.
    7·1 answer
  • Problem 4 (25 points)Consider a byte addressing architecture with 64-bit memory addresses.(a)Which bits of the address would be
    5·1 answer
  • How are online sources used? Check all that apply.
    6·2 answers
  • Anyone know how to do Calculator program in python ?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!