Which of the following statements about the authentication concept of information security management is true?
A. It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.
B. It ensures that modifications are not made to data by unauthorized personnel or processes .
C. It establishes the users' identity and ensures that the users are who they say they are.
D. It ensures the reliable and timely access to resources.
A. It determines the actions and behaviors of a single individual within a system, and identifies that particular individual.
B. It ensures that modifications are not made to data by unauthorized personnel or processes .
C. It establishes the users' identity and ensures that the users are who they say they are.
D. It ensures the reliable and timely access to resources.