The first phase of hacking an IT system is compromise of which foundation of security?
Q. The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. None of the Above
Answer: Confidentiality