To which component of the CIA triad security information principle does tokenization apply?
- availability
- authorization
- confidentiality
- integrity
Explanation: To accomplish confidentiality without encryption, tokenization is a substitution technique that can isolate data elements from exposure to other data systems.
Exam with this question: Network Support and Security Final Exam
Please login or Register to submit your answer