Answer: Data integrity issues
Explanation:
Answer:
Any form of Linux
Explanation:
The Linux OS is SUPER customizable, and it can still do everything that Windows or Mac OS does. Great Question.
Answer:
Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.