secret
The feature that information will not be disclosed or used by unauthorized users, entities or processes.
complete
The characteristics of data cannot be changed without authorization. In other words, information remains unchanged, not destroyed or lost during storage or transmission.
usability
Functions that authorized entities can access and use on demand. That is, whether the required information can be accessed when needed. For example, denial of service in the network environment, destroying the normal operation of the network and related systems, are all attacks on usability.
controllability
Ability to control the dissemination and content of information.
Examination ability
Provide basis and means when security problems occur.