Which of the following statements about the availability concept of Information security management is true?
A. It ensures that modifications are not made to data by unauthorized personnel or processes.
B. It determines actions and behaviors of a single individual within a system.
C. It ensures reliable and timely access to resources.
D. It ensures that unauthorized modifications are not made to data by authorized personnel or processes.
A. It ensures that modifications are not made to data by unauthorized personnel or processes.
B. It determines actions and behaviors of a single individual within a system.
C. It ensures reliable and timely access to resources.
D. It ensures that unauthorized modifications are not made to data by authorized personnel or processes.