Many security texts decompose the security of an information system in three components: confidentiality, integrity, and availability. Together, they are often referred to as "CIA". [They] constitute the core security properties that we must protect against attackers and eavesdroppers-such as the (other) CIA.