Which of the following core principles of information securi…