Using the Principles of the CIA Triad to Implement Software Security