The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as
A) data integrity.
B) human firewall.
C) information integrity.
D) information assurance.
Answer: D