53. Although the use of the CIA triad to define security objects is well established, some in the security field feel that additional concepts are needed to present a complete picture. Two of the most commonly mentioned are as follows:
Select one of the following: