Explanation of the Cybersecurity CIA Triad