Demonstrate your understanding of Core Principle 2 for Information Security through effective writing about the three security goals of Confidentiality, Integrity, and Availability.
Describe fully and provide specific examples of how a business can apply Principle 2 in order to achieve the goals below. Outline the risks of failure to achieve each of these goals:
Protect the confidentiality of data
Preserve the integrity of data
Promote the availability of data for authorized use