Computer Science, asked by deepshilasanu9831, 27 days ago

Discuss the examples of the real life where this security objectives needed 1)confidentaility
2)integrity
3)non repudiation

Answers

Answered by Itzchiyuu125
0

Answer:

.

.a set of words that is complete in itself, typically containing a subject and predicate, conveying a statement, question, exclamation, or command, and consisting of a main clause and sometimes one or more subordinate clauses.

.a set of words that is complete in itself, typically containing a subject and predicate, conveying a statement, question, exclamation, or command, and consisting of a main clause and sometimes one or more subordinate clauses.2.

.a set of words that is complete in itself, typically containing a subject and predicate, conveying a statement, question, exclamation, or command, and consisting of a main clause and sometimes one or more subordinate clauses.2.the punishment assigned to a defendant found guilty by a court, or fixed by law for a particular offence.

.a set of words that is complete in itself, typically containing a subject and predicate, conveying a statement, question, exclamation, or command, and consisting of a main clause and sometimes one or more subordinate clauses.2.the punishment assigned to a defendant found guilty by a court, or fixed by law for a particular offence."her husband is serving a three-year sentence for fraud"

Similar questions