Would the real Information Security triad please stand up?

The other day i was preparing a presentation about competing priorities in Information Security and thought it would be a nice idea to add a tongue in cheek reference to the usual Confidentiality, Integrity and Availability triad. With the ‘Good, Cheap, Fast – pick two’ model in mind i went to search for a suitable picture but to my surprise i didn’t really find any good visualisation for Information Security. Long story short, i decided to create a simple graphic myself. Based on feedback on Twitter it seems people like it so i’m putting it up here as well if anyone needs it.

the-real-information-security-triad