Q: 7
If data has been modified, which aspect of the Information Security triangle has been breached?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.