Which of the following statements about the availability concept of Information security
management is true?
A.
It ensures that modifications are not made to data by unauthorized personnel or
processes .
B.
It ensures reliable and timely access to resources.
C.
It determines actions and behaviors of a single individual within a system.
D.
It ensures that unauthorized modifications are not made to data by authorized
personnel or processes.