Definition: Only authorized users and processes should be able to access or modify data. Data privacy through encryption.
Definition: Data should be maintained in a correct state and nobody should be able to improperly modify it, either accidentally or maliciously.
Definition: Authorized users should be able to access data whenever they need to do so. Systems must be reliable and resilient.