Short Answer
Match each item with a statement below.
a.Accuracy
f.Data users
b.Authenticity
g.Integrity
c.Availability
h.Utility
d.Confidentiality
i.Data custodians
e.Data owners
-The quality or state of having value for some purpose or end.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q25: How does a man-in-the-middle attack work?
Q26: Describe the chief information security officer (CISO)
Q27: Describe how benchmarking and best practices are
Q28: An unlocked door is an example of
Q29: Which threat is the most common intellectual
Q31: The security blueprint is a detailed version
Q32: In information security, _ exists when a
Q33: Describe the issue-specific security policy (ISSP) and
Q34: Which term identifies a single instance of
Q75: _ is the protection of information and