The answer is True
It
intentionally or unintentionally compromises a system by making unauthorized changes
to data. As compared to intentional changes which are usually malicious, unintentional
changes are normally accidental. Changes and modifications to the system
configurations can also compromise integrity. Such modifications might include
deleting, changing, and creating information in a network resource.
It is best to implement mechanisms on how one can track and audit such changes as they happen
Answer:
the system development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems through a multistep process—initiation, analysis, design, implementation, and <u>maintenance to disposal.</u>
Explanation:
There are several SDLC models and each generally consists of a numbers of definite stages. For a given adopted SDLC model, information security and product services must be integrated in to the SDLC to ensure appropriate protection for the information that the system will transmit, process, and store.
B is the correct answer to ur questions