thegentlestoryk2591 thegentlestoryk2591 14-03-2024 Computers and Technology contestada The first phase of hacking an IT system is compromise of which foundation of security? a) Availability b) Confidentiality c) Integrity d) Authentication