1. Confidentiality: Ensuring that sensitive information is accessible only to authorized individuals. Techniques such as encryption and access controls are commonly employed. 2. Integrity: Maintaining the accuracy and completeness of data. This involves using checksums and other verification methods to detect unauthorized changes. 3. Availability: Ensuring that data is accessible when needed. This requires robust backup solutions and disaster recovery plans to prevent data loss.