Technology
How do your IT controls measure up against the information security triad?
Confidentiality, Integrity, Availability: The core principals of any effective information security program. Although often used interchangeably due to their tightly integrated concepts and areas of focus, the facets of a program for which they are used effectively differ in the implementation of controls.