Common methods of securing an IT system do NOT include
A) protecting system integrity by using antimalware programs
B) protecting data integrity by unblocking unauthorized access
C) protecting data integrity by creating backups, entering and editing data correctly
D) setting permissions to restrict access