Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality
Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality and integrity aspects of the Information Security Triad? Access-control systems and methodologies: