Q. This helps in identifying the origin of information and authentic user. This referred to here as (Solved)
1. confidentiality
2. integrity
3. authenticity
4. availability
- c. authenticity
1. confidentiality
2. integrity
3. authenticity
4. availability