Answer: the aspect of secure communications that is addressed is origin authentication.
Step-by-step explanation:
When using Data Origin Authentication, the recipient is able to verify that messages have not been tampered with in transit (Data Integrity) and that they originate from the expected sender (Authenticity).