During а phishing simulаtiоn, emplоyees аt a financial institutiоn were tricked into entering their credentials on a fake login page. The attackers used these credentials to transfer funds from multiple accounts before being detected. What aspect of the CIA triad does this scenario most directly illustrate?