Answer:
The three faces are information states, security goals, countermeasures.
Step-by-step explanation:
Each face has different subjects about Informatics security, we will start with:
Information States
Storage is how we save data, for example, USB or hard drive.
Transmission is how we transfer data.
Process is how we make operations with data.
Security goals
Confidentiality is not showing data to unauthorized people.
Integrity is not modified data accidentally.
Availability is access to data timely.
Countermeasures
Politics is saving data with rules.
Human factors is training people in Informatics security.
Technology is software or hardware for Informatics security.