Answer:
confidentiality, integrity, availability
Explanation:
Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others
Integrity: Keeping the data intact, complete and accurate, and IT systems operational
Availability: An objective indicating that information or system is at disposal of authorized users when needed.
Social Engineering is the art of eliciting sensitive information from people by tricking them. Like through phishing, fake emails that contain a virus and fake programs. They get your password or any other sensitive information by making you think the website/program is legit. That's why you should always make sure the new website/program you visited is safe.
Reverse Social Engineering is, on the other hand, where the initial attacker becomes attacked. Or the victim redirects the attacker to someone who can counter the attacker. E.g attackers call the front desk and ask for information X. Instead or giving him information X, front desk redirects the call to the security department. An example is where the attacker is fed false information. Law enforcement agencies often perform this attack.
They made it easier because they mapped out some of the galaxy and hazardous things like Astroid belts or rogue planets
The ribbon is a set of toolbars at the top of the window in Office programs designed to help you quickly find the commands that you need to complete a task. Sometimes the ribbon can get hidden and it's hard to find. The quickest way to show the ribbon is to click on any visible tab, like Home<span>, </span>Insert<span> or </span>Design<span>. You might also want to hide the ribbon to maximize screen space.</span>
Answer:
D
Explanation:
because it is a sequence it does more than one thing