Confidentiality, integrity, and availability are typically viewed as the primary goals and objectives of a security. which of the following is not considered a violation of confidentiality?

A) Eavesdropping on wireless network communications
B) Hardware destruction caused by arson
C) Social engineering that tricks a user into providing personal information to a false website
D) Stealing passwords using a keystroke logging tool