Check Point Certified Security Principles Associate (CCSPA) (#59)

Why does the (ISC)2 access-control systems and methodology functional domain address both the confidentiality and integrity aspects of the Information Security Triad? Access-control systems and methodologies:

are required standards in health care and banking.
provide redundant systems and data backups.
control who is allowed to view and modify information.
are academic models not suitable for implementation.
set standards for acceptable media-storage devices.