The 3 Goals of Information Security || part 2