Which of the following concepts represent the three fundamental principles of information security?