Which of the following is a fundamental principle of information security basics as it applies to Certified Security Investigator?