Which of the following options can be considered as Data and Application security risks in IT
infrastructure
Data integrity
Data access control
Data readiness
Data encryption
Submit