Apply the parts of the CIA triad (confidentiality, integrity, and availability) to a given security scenario.