How is data integrity within Security Administration best defined?
A.
All authorized users should feel confident that the data presented to them is accurate and
not improperly modified.
B.
Authorized users should be able to access the data they need when they need it.
C.
Business process owners must be confident that transactions, once processed, cannot be
denied afterwards.
D.
Only authorized individuals should be able to access data.