Home

In case of modification an unauthorized party not only gains access to but tampers with an asset. This is an attack on ____________________.

A. availability

B. confidentiality

C. integrity

D. authenticity

Please do not use chat terms. Example: avoid using "grt" instead of "great".