in Operating System
275 views
0 votes
0 votes
Match the following

a.  Secrecy.                     1. Limit the resource usage.

b Integrity               2. Unauthorized modification

c availbility.            3. Unauthorized  disclosure
in Operating System
275 views

1 Answer

0 votes
0 votes
a-3  

b-2

c-1

correct me if i am wrong
by

Related questions