Question

What three principles are used to define the C.I.A. triad? Define each in the context in which it is used in information security.