What is breach of confidentiality?
(a) This type of violation involves unauthorized reading of data
(b) This violation involves unauthorized modification of data
(c) This violation involves unauthorized destruction of data
(d) This violation involves unauthorized use of resources
This question was addressed to me in my homework.
The origin of the question is Security in portion Security of Operating System