What is the breach of integrity?
(a) This type of violation involves unauthorized reading of data
(b) This violation involves unauthorized modification of data
(c) This violation involves unauthorized destruction of data
(d) This violation involves unauthorized use of resources
I got this question in an international level competition.
This intriguing question originated from Security in division Security of Operating System