Information availability is compromised when authorized users cannot get proper ________ information in the customary and usable manner.
a. Write permission to
b. Access to
c. Credentials of
d. All of the above