Here’s a quick way to remember key (oh snap) IT security goals: think of cannibalistic CIA agents.

C
Confidentiality
I
Integrity
A
Availability
E
Entity Authentication
A
Access Control
T
Timeliness
M
Message Origin Authentication
A
Authorisation
N
Non-Repudiation

You’re welcome.