This helps in identifying the origin of information and authentic user. This referred to here as __________
(a) Confidentiality
(b) Integrity
(c) Authenticity
(d) Availability
I have been asked this question in a job interview.
The origin of the question is Elements of Security in chapter Cyber Security of Cyber Security