The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as

The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as 










A) data integrity.
B) human firewall.
C) information integrity.
D) information assurance.











Answer: D


E Commerce

Learn More Multiple Choice Question :