Characterize the CIA principles and use them to classify a variety of cyber scenarios. Identify and disseminate vulnerabilities in the data security space- social (human) and technical (digital).