If we consider a message in transit across the network as the "information", the most important security attributes for "information security" should be: Confidentiality, Integrity, and Authenticity (not Availability). Consider a group of users who share a common encryption key. One member can impersonate another member to create a message, encrypt it with the group key, hash it for integrity, but its authenticity is violated.
Another associate security triad would be non-repudiation, availability, and freshness, i.e. nRAF.
In summary, there are two security triads: CIA nRAF. The first group (confidentiality, integrity, and authenticity) is paramount, the second group, where Availability resides, is also important but secondary.