What is breach of availability?
(a) This type of violation involves unauthorized reading of data
(b) This violation involves unauthorized modification of data
(c) This violation involves unauthorized destruction of data
(d) This violation involves unauthorized use of resources
The question was posed to me in an interview for job.
I would like to ask this question from Security topic in chapter Security of Operating System