IT Professional work hard to protect key characteristics of an asset from security breaches. One of these characteristics is ______, or the property that data is accessible and modifiable when needed by those authorized to do. a) intergrity, b) confidentiality c) availability, d) reliability