Which of the following statements about the availability concept of Information security management is true?
A.
It ensures that modifications are not made to data by unauthorized personnel or processes .
B.
It ensures reliable and timely access to resources.
C.
It determines actions and behaviors of a single individual within a system.
D.
It ensures that unauthorized modifications are not made to data by authorized personnel or processes.