You are setting up a procedure to keep documents exchanged between members of the R & D
department secret. They will be sending these documents across the Internet to each other. Which
PKI process will you need to employ to achieve this?
A.
 Confidentiality
B.
 Non-repudiation
C.
 Authentication
D.
 Data Integrity