All three of these areas – confidentiality, integrity, and availability – must be present in order to provide a secure information environment. This is true for information that is stored as well as transmitted. James Antonakos of the National Cybersecurity Institute explains.
Having trouble with media player? Click here to listen.