- Confidentiality — Preserving authorized restrictions on access, including means for protecting personal privacy and proprietary information.
- Integrity — Guarding against improper information modification or destruction.
- Availability — Ensuring timely and reliable access to and use of information.
- Authenticity — Assuring confidence in the validity of a transmission, message, or message ordinator.
- Accountability — Providing the capability of actions being traced to their originator. Records should be kept to provide post-attack analysis and for meeting legal requirements.
Subsections