You are setting up a procedure to keep documents exchanged between members of the R & D
department secret. They will be sending these documents across the Internet to each other. Which
PKI process will you need to employ to achieve this?
A.
Confidentiality
B.
Non-repudiation
C.
Authentication
D.
Data Integrity