Cryptographic mechanisms exist to prevent the unauthorized disclosure and/or modification of backup information.
Are cryptographic mechanisms utilized to prevent the unauthorized disclosure and/or modification of backup information?