Question 1 of 10

Explain the CIA triad and why it is considered the foundation of information security. Can you provide a practical example for each component?