Which of the following is done PRIMARILY to address the integrity of information?
A. Assignment of appropriate control permissions
B. Implementation of an Internet security application
C. Implementation of a duplex server system
D. Encryption of email
A. Assignment of appropriate control permissions
B. Implementation of an Internet security application
C. Implementation of a duplex server system
D. Encryption of email