CIA Model Analysis Report: Strengths, Weaknesses, and Model Comparison
VerifiedAdded on  2022/12/23
|12
|3813
|70
Report
AI Summary
This report provides a comprehensive analysis of the CIA (Confidentiality, Integrity, Availability) model, a fundamental framework for information security. It begins with an introduction that explains the significance of data security and the role of the CIA Triad in protecting organizational information assets. The report then delves into a detailed examination of each component of the CIA Triad, defining confidentiality, integrity, and availability and explaining their importance. The report highlights the strengths of the CIA model, such as its ability to provide a clear framework for information security goals and its integration of various security measures. It also identifies weaknesses, including challenges related to Big Data, data oversight, and IoT privacy. The report concludes with a comparison of the CIA model with other security models such as Parkerian Hexad, Five Pillars of Information Assurance and RMIAS, further illustrating its role in the broader landscape of information security. The report is structured to provide a clear understanding of the CIA model's principles, practical applications, and limitations, making it a valuable resource for students and professionals in the field of information security.

Running head: CIA MODEL ANALYSIS
CIA MODEL ANALYSIS
Name of the Student
Name of the University
Author note
CIA MODEL ANALYSIS
Name of the Student
Name of the University
Author note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CIA MODEL ANALYSIS
Table of Contents
Introduction......................................................................................................................................2
CIA concept analysis.......................................................................................................................2
Strength............................................................................................................................................4
Weakness.........................................................................................................................................5
Compare and contrast of the model with Parkerian Hexad, Five Pillars of Information Assurance
and RMIAS......................................................................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................9
Table of Contents
Introduction......................................................................................................................................2
CIA concept analysis.......................................................................................................................2
Strength............................................................................................................................................4
Weakness.........................................................................................................................................5
Compare and contrast of the model with Parkerian Hexad, Five Pillars of Information Assurance
and RMIAS......................................................................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................9

2CIA MODEL ANALYSIS
Introduction
Knowledge has been one of the major asset of different organization for developing
operational strategy. It has been observed that knowledge has been infinite and the major
advantage received is that the data can be used in a simultaneous manner as well (Lewis 2017).
However the data and information that are used requires security as well. Data security has been
one of the major challenge that is faced by the organizations. Several models are considered for
securing the data. CIA Triad is one of the major security system that is implemented by the
business organizations for securing the data that are used in the organization (Daniels 2019). The
major concepts that are present in the CIA Triad are namely Confidentiality, Availability and
Integrity of the data. It can be stated that amalgamating CIA Triad has been providing high
robustness to the data. This report discusses about the basic understanding of the terminology of
CIA Tread. The strengths and weaknesses of the terminology is also well described in the report.
This report also provides a proper and precise description regarding acceptance of the CIA Triad
Model. A comparison of the CIA Triad with other models are also provided in the report.
CIA concept analysis
CIA Triad is abbreviated as Confidentiality Integrity and Availability. This model has
been designed for providing proper guidance to the policies regarding the security of the
information. It has been seen that few scholars address CIA Triad as AIC Triad. In that case it is
abbreviated as Availability, Integrity and Confidentiality (Qadir and Quadri 2016). The elements
that comprise of the CIA Triad acts important for providing security to the data of the
organization. It is considered that Confidentiality has been a set of rules that provide proper
assessment of the rules that has been limiting the access to information. The integrity section is
mainly focused in assuring that the information that are received are highly trustworthy and
robust in nature. Accuracy of the data are also considered in this section (Moghaddasi, Sajjadi
and Kamkarhaghighi 2016). Availability of the data helps in understanding the accessibility of
the data and the personnel who will be having the authority to access the data is provided as well.
Confidentiality
Confidentiality section is basically focused on the security of the data. The main role of
confidentiality is to impose popper assessment of the security of the data. Security has been one
Introduction
Knowledge has been one of the major asset of different organization for developing
operational strategy. It has been observed that knowledge has been infinite and the major
advantage received is that the data can be used in a simultaneous manner as well (Lewis 2017).
However the data and information that are used requires security as well. Data security has been
one of the major challenge that is faced by the organizations. Several models are considered for
securing the data. CIA Triad is one of the major security system that is implemented by the
business organizations for securing the data that are used in the organization (Daniels 2019). The
major concepts that are present in the CIA Triad are namely Confidentiality, Availability and
Integrity of the data. It can be stated that amalgamating CIA Triad has been providing high
robustness to the data. This report discusses about the basic understanding of the terminology of
CIA Tread. The strengths and weaknesses of the terminology is also well described in the report.
This report also provides a proper and precise description regarding acceptance of the CIA Triad
Model. A comparison of the CIA Triad with other models are also provided in the report.
CIA concept analysis
CIA Triad is abbreviated as Confidentiality Integrity and Availability. This model has
been designed for providing proper guidance to the policies regarding the security of the
information. It has been seen that few scholars address CIA Triad as AIC Triad. In that case it is
abbreviated as Availability, Integrity and Confidentiality (Qadir and Quadri 2016). The elements
that comprise of the CIA Triad acts important for providing security to the data of the
organization. It is considered that Confidentiality has been a set of rules that provide proper
assessment of the rules that has been limiting the access to information. The integrity section is
mainly focused in assuring that the information that are received are highly trustworthy and
robust in nature. Accuracy of the data are also considered in this section (Moghaddasi, Sajjadi
and Kamkarhaghighi 2016). Availability of the data helps in understanding the accessibility of
the data and the personnel who will be having the authority to access the data is provided as well.
Confidentiality
Confidentiality section is basically focused on the security of the data. The main role of
confidentiality is to impose popper assessment of the security of the data. Security has been one
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CIA MODEL ANALYSIS
of the major aspect that is considered. Proper assessing of the personnel who will be having
authority to access the data has been another major aspect (Lundgren and Möller 2019). Proper
restriction of the data is provided for the people who will be not be having the authority to access
the data. In this section categorization and sectioning of data is made as well. With the help of
proper categorization of data, the harm one set of data can cause is stated. The type of damage
that can be caused due to the breaching of the data is also estimated. Issues that will be arising
after the data gets breached is also considered in this case. Steps that are to be taken for the
securing the data is also decided in this section (Puthal, Ranjan and Chen 2019). Special
trainings are sometimes required for processing of the security of data. This training will be
customizing the risks that might occur with the people. Again proper training will ensure that the
aspects that will be providing strength to the password will be known. This will ensure that the
robustness of the password that is set will be high. Best practices regarding the implementation
of strong password as per the social engineering will be providing a better result in case of
having proper security. This will help in preventing security related issues (Namasudra et al,
2018). One of the best examples that can be provided includes that of the maintaining
confidentiality of the account number. In this process a specific set of people will be capable of
having the data and rest of the individuals will not be having any access in the process. Data
encryption has been one of the major process that is implemented in the process of maintaining
the confidentiality. User ID performance along with the password constituents will be providing
high benefit to the entire process of security. Data encryption is also another section that ensures
management of the security process (Althonayan and Andronache 2018). Usage of the two factor
authentication process has been benefitting the entire data security process as well. Proper care
needs to be taken for proper security of the data.
Integrity
Integrity of the data deals with the consistency, trustworthiness and accuracy of the data
has been performed. Data must not be changing in the transit process (Singh, Rishiwal and
Kumar 2018). Only authority of changing and altering the data needs to be provided to a certain
authorized set of people. Result of human caused electromagnetic pulse as well as the server
crush is considered as well (Kang et al, 2016). Verification identity is performed and hence wise
redundancies are to be managed in the section.
of the major aspect that is considered. Proper assessing of the personnel who will be having
authority to access the data has been another major aspect (Lundgren and Möller 2019). Proper
restriction of the data is provided for the people who will be not be having the authority to access
the data. In this section categorization and sectioning of data is made as well. With the help of
proper categorization of data, the harm one set of data can cause is stated. The type of damage
that can be caused due to the breaching of the data is also estimated. Issues that will be arising
after the data gets breached is also considered in this case. Steps that are to be taken for the
securing the data is also decided in this section (Puthal, Ranjan and Chen 2019). Special
trainings are sometimes required for processing of the security of data. This training will be
customizing the risks that might occur with the people. Again proper training will ensure that the
aspects that will be providing strength to the password will be known. This will ensure that the
robustness of the password that is set will be high. Best practices regarding the implementation
of strong password as per the social engineering will be providing a better result in case of
having proper security. This will help in preventing security related issues (Namasudra et al,
2018). One of the best examples that can be provided includes that of the maintaining
confidentiality of the account number. In this process a specific set of people will be capable of
having the data and rest of the individuals will not be having any access in the process. Data
encryption has been one of the major process that is implemented in the process of maintaining
the confidentiality. User ID performance along with the password constituents will be providing
high benefit to the entire process of security. Data encryption is also another section that ensures
management of the security process (Althonayan and Andronache 2018). Usage of the two factor
authentication process has been benefitting the entire data security process as well. Proper care
needs to be taken for proper security of the data.
Integrity
Integrity of the data deals with the consistency, trustworthiness and accuracy of the data
has been performed. Data must not be changing in the transit process (Singh, Rishiwal and
Kumar 2018). Only authority of changing and altering the data needs to be provided to a certain
authorized set of people. Result of human caused electromagnetic pulse as well as the server
crush is considered as well (Kang et al, 2016). Verification identity is performed and hence wise
redundancies are to be managed in the section.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CIA MODEL ANALYSIS
Availability
In this section the main assessment that is considered is rigorous maintaining of the
hardware and hence wise proper assessment of the operating system is maintained. Maintaining
of the properly functioning operating system is considered. Proper updates that are to be instilled
in the process are also described (Shoufan and Damiani 2017). Another major aspect that is
considered is that proper providing of the communicating bandwidth as per the occurrence of
bottleneck has been highly important in the process. Safeguarding data against the loss in the
connectivity process is maintained (Mijnhardt, Baars and Spruit 2016). Providing proper security
based components have been benefitting the entire process and hence occurrence of the
unpredictable events will be affecting the entire process in a positive manner. Usage of the proxy
server safeguards the downtime as well. Denial of Service attack also occurs and steps are taken
against this issue and availability is the section that deals with these issues.
Strength
In order to identify the strength of the CIA triad, it is important to analyse this model
from the perspective of information security issues. If the security of the data is compromised
and accessed illegally, then it will compromise the confidentiality of the data (Rawat and
Bajracharya 2015). If data is manipulated without proper authorization, then it will affect the
integrity of the data. If the overall system is taken down and data is deleted without proper
permissions, then it will affect the availability of the data as well (Rjaibi and Rabai 2015).
In order to ensure that organization implement information security strategies properly, it
is important to define the overall goals of the information security. In this context, it is important
to define these goals to the information technology along with business professionals in a
simplified way so that it is easy for them to interpret these goals and apply it in organizational
context as well (Andress and Leary 2016). The CIA triad model is capable of ensuring that
overall goal of the information security strategy is provided to these professionals from
information security and business professionals. This is one of the most important aspects of the
CIA triad model and therefore analysed in this context as well (Brennan 2018).
In order to ensure security of the business as well as organizational data, it is important to
integrate all of the security measures and apply it properly. However, in order to apply these
Availability
In this section the main assessment that is considered is rigorous maintaining of the
hardware and hence wise proper assessment of the operating system is maintained. Maintaining
of the properly functioning operating system is considered. Proper updates that are to be instilled
in the process are also described (Shoufan and Damiani 2017). Another major aspect that is
considered is that proper providing of the communicating bandwidth as per the occurrence of
bottleneck has been highly important in the process. Safeguarding data against the loss in the
connectivity process is maintained (Mijnhardt, Baars and Spruit 2016). Providing proper security
based components have been benefitting the entire process and hence occurrence of the
unpredictable events will be affecting the entire process in a positive manner. Usage of the proxy
server safeguards the downtime as well. Denial of Service attack also occurs and steps are taken
against this issue and availability is the section that deals with these issues.
Strength
In order to identify the strength of the CIA triad, it is important to analyse this model
from the perspective of information security issues. If the security of the data is compromised
and accessed illegally, then it will compromise the confidentiality of the data (Rawat and
Bajracharya 2015). If data is manipulated without proper authorization, then it will affect the
integrity of the data. If the overall system is taken down and data is deleted without proper
permissions, then it will affect the availability of the data as well (Rjaibi and Rabai 2015).
In order to ensure that organization implement information security strategies properly, it
is important to define the overall goals of the information security. In this context, it is important
to define these goals to the information technology along with business professionals in a
simplified way so that it is easy for them to interpret these goals and apply it in organizational
context as well (Andress and Leary 2016). The CIA triad model is capable of ensuring that
overall goal of the information security strategy is provided to these professionals from
information security and business professionals. This is one of the most important aspects of the
CIA triad model and therefore analysed in this context as well (Brennan 2018).
In order to ensure security of the business as well as organizational data, it is important to
integrate all of the security measures and apply it properly. However, in order to apply these

5CIA MODEL ANALYSIS
security measures, effective security framework is required. Therefore, organizations often
consider CIA triad model which is one of the most popular and efficient information security
model. It not only allows to integrate all of the security strategies, but also integrate those
security measures along with the requirements of the organizations as well and for this three
aspects of triad model that is confidentiality, integrity and availability play an important role
(Baker and River 2016). These three elements of the triad model provides majority of the
security strategies that is required to ensure the security of the information from organizational
perspective. However, in order to identify the benefits of this model, it is required to analyse
various offensive as well as defensive techniques. It is also required to identify how these
techniques affects confidentiality, integrity and availability of the information that the
organization collects for executing its business process.
For example, if a hacker exploits the network traffic, then it allows the hacker to access
information that is communicated over the network, therefore it is a compromise to the
confidentiality of the information. If data stored in the hard drive is corrupted, then it affects the
integrity of the data. If a system file is modified for example if hard drive of the owner of the
data, then it affects the availability of the data (Biswas, Gupta and Haque 2019). Identification of
security issues is not important it is also required to analyse how these issues are related with the
confidentiality, integrity and availability of the information to ensure that the application of the
CIA triad is effective and efficient as well. Therefore, identification of information security
through the CIA triad model is an effective strategy for the organizations to ensure
confidentiality, integrity and availability of the information that is required in the organizational
context.
Weakness
There are certain weaknesses that are present in the functioning of the CIA Triad as well.
Big Data has been creating a major challenge in the process. Due to the presence of the Big Data,
the main issue faced by CIA Triad is that the amount of data that is needed to be protected is
huge. This affects the functionality of the process. It has been seen that multiplicity of the
sources has a variety of formats and providing proper protection has been the major challenge.
Again the cost that is incurred in securing the data that are already replicated and there is a huge
set of data that are to be protected (Reitz 2019). This leads to the fact that the cost incurred in the
security measures, effective security framework is required. Therefore, organizations often
consider CIA triad model which is one of the most popular and efficient information security
model. It not only allows to integrate all of the security strategies, but also integrate those
security measures along with the requirements of the organizations as well and for this three
aspects of triad model that is confidentiality, integrity and availability play an important role
(Baker and River 2016). These three elements of the triad model provides majority of the
security strategies that is required to ensure the security of the information from organizational
perspective. However, in order to identify the benefits of this model, it is required to analyse
various offensive as well as defensive techniques. It is also required to identify how these
techniques affects confidentiality, integrity and availability of the information that the
organization collects for executing its business process.
For example, if a hacker exploits the network traffic, then it allows the hacker to access
information that is communicated over the network, therefore it is a compromise to the
confidentiality of the information. If data stored in the hard drive is corrupted, then it affects the
integrity of the data. If a system file is modified for example if hard drive of the owner of the
data, then it affects the availability of the data (Biswas, Gupta and Haque 2019). Identification of
security issues is not important it is also required to analyse how these issues are related with the
confidentiality, integrity and availability of the information to ensure that the application of the
CIA triad is effective and efficient as well. Therefore, identification of information security
through the CIA triad model is an effective strategy for the organizations to ensure
confidentiality, integrity and availability of the information that is required in the organizational
context.
Weakness
There are certain weaknesses that are present in the functioning of the CIA Triad as well.
Big Data has been creating a major challenge in the process. Due to the presence of the Big Data,
the main issue faced by CIA Triad is that the amount of data that is needed to be protected is
huge. This affects the functionality of the process. It has been seen that multiplicity of the
sources has a variety of formats and providing proper protection has been the major challenge.
Again the cost that is incurred in securing the data that are already replicated and there is a huge
set of data that are to be protected (Reitz 2019). This leads to the fact that the cost incurred in the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6CIA MODEL ANALYSIS
process has been high. Data oversight has been lacking as well. Useful interpretation of data is
performed, however the main issue that is present in the process is that the data collected has
been affecting the over sighting process of the data (Duncan and Whittington 2016).
Internet of Things Privacy issue have also been acting as a major challenge as well as the
weakness of the model of CIA Triad. In this process special data security process is implemented
for securing the data from the exposure of the IOT environment (Puthal, Ranjan and Chen 2019).
In this case the physical and logical entity of the data have been providing proper assessment of
the unique identifier. This section of privacy is not performed in a proper manner. This security
and privacy issue acts as one of the major weakness of the CIA Triad.
Focus on information has been one of the major weakness of the CIA Triad. It has been
observed that a narrow view of the security trend is considered in case of the operational process.
Another major weakness of the process is that it is highly dependent on the integration section
(Riadi, Fadlil and Fauzan 2018). It has been observed that in case proper confidentiality is
maintained, the main issue that is present in the process is that encryption of the data has been
made to the highest extent. Although the main challenge that is present in the process of this
encryption is that without the integrity protection. the vulnerability increases. For example, in
case a data set is encrypted and integration is not performed in a proper manner, leading to the
fact that the set of authorized personnel is not set and the decryption key is available to the
public, the entire set of data will be available to the entire audience set and this will lead to the
fact that the data breaching will be an obvious case. This have been acting as a major weakness
of the CIA Triad model.
Compare and contrast of the model with Parkerian Hexad, Five Pillars of
Information Assurance and RMIAS
There is a major difference in between the Parkerian Hexard and that of the CIA Triad.
The difference observed is in the process is that the preciseness in handling the issue. It has been
seen that in case of the usage of the CIA Triad, there are 3 major elements. The elements are
namely Confidentiality, Integrity and Availability. These are the elements that are implemented
in the process. Whereas in case of Parkerian Hexard model, the elements which acts as heads for
measuring of the security has been more. This proves that segmentation of the security process
process has been high. Data oversight has been lacking as well. Useful interpretation of data is
performed, however the main issue that is present in the process is that the data collected has
been affecting the over sighting process of the data (Duncan and Whittington 2016).
Internet of Things Privacy issue have also been acting as a major challenge as well as the
weakness of the model of CIA Triad. In this process special data security process is implemented
for securing the data from the exposure of the IOT environment (Puthal, Ranjan and Chen 2019).
In this case the physical and logical entity of the data have been providing proper assessment of
the unique identifier. This section of privacy is not performed in a proper manner. This security
and privacy issue acts as one of the major weakness of the CIA Triad.
Focus on information has been one of the major weakness of the CIA Triad. It has been
observed that a narrow view of the security trend is considered in case of the operational process.
Another major weakness of the process is that it is highly dependent on the integration section
(Riadi, Fadlil and Fauzan 2018). It has been observed that in case proper confidentiality is
maintained, the main issue that is present in the process is that encryption of the data has been
made to the highest extent. Although the main challenge that is present in the process of this
encryption is that without the integrity protection. the vulnerability increases. For example, in
case a data set is encrypted and integration is not performed in a proper manner, leading to the
fact that the set of authorized personnel is not set and the decryption key is available to the
public, the entire set of data will be available to the entire audience set and this will lead to the
fact that the data breaching will be an obvious case. This have been acting as a major weakness
of the CIA Triad model.
Compare and contrast of the model with Parkerian Hexad, Five Pillars of
Information Assurance and RMIAS
There is a major difference in between the Parkerian Hexard and that of the CIA Triad.
The difference observed is in the process is that the preciseness in handling the issue. It has been
seen that in case of the usage of the CIA Triad, there are 3 major elements. The elements are
namely Confidentiality, Integrity and Availability. These are the elements that are implemented
in the process. Whereas in case of Parkerian Hexard model, the elements which acts as heads for
measuring of the security has been more. This proves that segmentation of the security process
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CIA MODEL ANALYSIS
has been highly precise in nature. There are 6 elements, under which the entire security process
is differentiated. The six elements are namely Confidentiality, Control, Integrity, Authenticity,
Availability and Utility (Boyes 2015). This sections not only helps in understanding the
confidentiality techniques that are to be implemented for securing the data along with the
personnel’s having the accessing power, this model is also concerned with the authenticity of the
personnel are allowed to have access in the process. Utility of the security process
implementation is also considered.
Five Pillars of Information Assurance also acts as a major security assessment model.
The operational process of the Five Pillars of Information Assurance model has been quite
similar to that of the CIA Triad model. It has been seen that CIA Triad has been only dealing
with the Confidentiality, Integrity and Availability. Although this process have been highly
stable, lack of preciseness have been observed. Again in case of using the model of Five Pillars
of Information Assurance, this lacking of preciseness can be eliminated. In case of Five Pillars of
Information Assurance, there are 5 major segments that are considered (Sadiku, Alam and Musa
2017). This 5 components includes the likes of confidentiality, integrity, non-repudiation and
authentication to achieve have been acting as the major elements. The excess factors that are
present is the authenticity section. In this case the authenticity of the reliability has been analyzed
in this section. Again in case of the non-repudiation sections, the main aspect that is considered
is that receiver and identity of the sender is also analyzed. Security principle are approved as per
the requirement. These are the sections that are missing from the operational process of the CIA
Triad.
There is a huge difference in between the operations of the CIA Triad and Reference
Model of Information Assurance and Security model. The RMIAS models deals with the
completeness, risk analysis, cost effectiveness and efficiency as well as the consistency. In the
process, Security development Life Cycle is also considered (Hawkins et al, 2015). Proper
discussion of the Information Taxonomy, Security Goals and Security Countermeasures are also
considered. Whereas the operational process of CIA Triad is focused on the confidentiality,
integrity and Availability.
has been highly precise in nature. There are 6 elements, under which the entire security process
is differentiated. The six elements are namely Confidentiality, Control, Integrity, Authenticity,
Availability and Utility (Boyes 2015). This sections not only helps in understanding the
confidentiality techniques that are to be implemented for securing the data along with the
personnel’s having the accessing power, this model is also concerned with the authenticity of the
personnel are allowed to have access in the process. Utility of the security process
implementation is also considered.
Five Pillars of Information Assurance also acts as a major security assessment model.
The operational process of the Five Pillars of Information Assurance model has been quite
similar to that of the CIA Triad model. It has been seen that CIA Triad has been only dealing
with the Confidentiality, Integrity and Availability. Although this process have been highly
stable, lack of preciseness have been observed. Again in case of using the model of Five Pillars
of Information Assurance, this lacking of preciseness can be eliminated. In case of Five Pillars of
Information Assurance, there are 5 major segments that are considered (Sadiku, Alam and Musa
2017). This 5 components includes the likes of confidentiality, integrity, non-repudiation and
authentication to achieve have been acting as the major elements. The excess factors that are
present is the authenticity section. In this case the authenticity of the reliability has been analyzed
in this section. Again in case of the non-repudiation sections, the main aspect that is considered
is that receiver and identity of the sender is also analyzed. Security principle are approved as per
the requirement. These are the sections that are missing from the operational process of the CIA
Triad.
There is a huge difference in between the operations of the CIA Triad and Reference
Model of Information Assurance and Security model. The RMIAS models deals with the
completeness, risk analysis, cost effectiveness and efficiency as well as the consistency. In the
process, Security development Life Cycle is also considered (Hawkins et al, 2015). Proper
discussion of the Information Taxonomy, Security Goals and Security Countermeasures are also
considered. Whereas the operational process of CIA Triad is focused on the confidentiality,
integrity and Availability.

8CIA MODEL ANALYSIS
Conclusion
From the above discussion, it can be stated that information has been one of the major
instrument has been enhancing the operational process of the business organizations, Hence the
need of implementing security techniques are included. CIA Triad has been one of the most
important model that has been in use. This model provides proper assessment of the data security
taking into consideration of confidentiality, integrity and availability. With the help of this model
proper assessment of the data can be made. Despite the advantages present, disadvantages are
present as well. However, the strength of the model has been much higher than the weakness
present.
Conclusion
From the above discussion, it can be stated that information has been one of the major
instrument has been enhancing the operational process of the business organizations, Hence the
need of implementing security techniques are included. CIA Triad has been one of the most
important model that has been in use. This model provides proper assessment of the data security
taking into consideration of confidentiality, integrity and availability. With the help of this model
proper assessment of the data can be made. Despite the advantages present, disadvantages are
present as well. However, the strength of the model has been much higher than the weakness
present.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9CIA MODEL ANALYSIS
References
Althonayan, A. and Andronache, A., 2018, September. Shifting from Information Security
towards a Cybersecurity Paradigm. In Proceedings of the 2018 10th International Conference on
Information Management and Engineering (pp. 68-79). ACM.
Andress, J. and Leary, M., 2016. Building a Practical Information Security Program. Syngress.
Baker, A. and River, W., 2016. A Survey of Information Security Implementations for the
Internet of Things. technical white paper, Wind River.
Biswas, C., Gupta, U.D. and Haque, M.M., 2019, February. An efficient algorithm for
confidentiality, integrity and authentication using hybrid cryptography and steganography.
In 2019 International Conference on Electrical, Computer and Communication Engineering
(ECCE) (pp. 1-5). IEEE.
Boyes, H., 2015. Cybersecurity and cyber-resilient supply chains. Technology Innovation
Management Review, 5(4), p.28.
Brennan, D., 2018. Quantum Computational Supremacy: Security and Vulnerability in a New
Paradigm. Irish Communication Review, 16(1), p.10.
Daniels, A., 2019. Information Security in an Internet of Things Network Based on Blockchains
and User Participation.
Duncan, R.A.K. and Whittington, M., 2016. Enhancing cloud security and privacy: The power
and the weakness of the audit trail. CLOUD COMPUTING 2016.
Hawkins, R., Habli, I., Kolovos, D., Paige, R. and Kelly, T., 2015, January. Weaving an
assurance case from design: a model-based approach. In 2015 IEEE 16th International
Symposium on High Assurance Systems Engineering (pp. 110-117). IEEE.
Kang, J.W., Yu, Q., Holden, E.P. and Oh, T.H., 2016, September. Security Requirements
Embedded in MS Programs in Information Sciences and Technologies. In Proceedings of the
17th Annual Conference on Information Technology Education (pp. 77-82). ACM.
Lewis, K., 2017. Security Policies and Plans Development. In Computer and Information
Security Handbook (pp. 565-570). Morgan Kaufmann.
References
Althonayan, A. and Andronache, A., 2018, September. Shifting from Information Security
towards a Cybersecurity Paradigm. In Proceedings of the 2018 10th International Conference on
Information Management and Engineering (pp. 68-79). ACM.
Andress, J. and Leary, M., 2016. Building a Practical Information Security Program. Syngress.
Baker, A. and River, W., 2016. A Survey of Information Security Implementations for the
Internet of Things. technical white paper, Wind River.
Biswas, C., Gupta, U.D. and Haque, M.M., 2019, February. An efficient algorithm for
confidentiality, integrity and authentication using hybrid cryptography and steganography.
In 2019 International Conference on Electrical, Computer and Communication Engineering
(ECCE) (pp. 1-5). IEEE.
Boyes, H., 2015. Cybersecurity and cyber-resilient supply chains. Technology Innovation
Management Review, 5(4), p.28.
Brennan, D., 2018. Quantum Computational Supremacy: Security and Vulnerability in a New
Paradigm. Irish Communication Review, 16(1), p.10.
Daniels, A., 2019. Information Security in an Internet of Things Network Based on Blockchains
and User Participation.
Duncan, R.A.K. and Whittington, M., 2016. Enhancing cloud security and privacy: The power
and the weakness of the audit trail. CLOUD COMPUTING 2016.
Hawkins, R., Habli, I., Kolovos, D., Paige, R. and Kelly, T., 2015, January. Weaving an
assurance case from design: a model-based approach. In 2015 IEEE 16th International
Symposium on High Assurance Systems Engineering (pp. 110-117). IEEE.
Kang, J.W., Yu, Q., Holden, E.P. and Oh, T.H., 2016, September. Security Requirements
Embedded in MS Programs in Information Sciences and Technologies. In Proceedings of the
17th Annual Conference on Information Technology Education (pp. 77-82). ACM.
Lewis, K., 2017. Security Policies and Plans Development. In Computer and Information
Security Handbook (pp. 565-570). Morgan Kaufmann.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10CIA MODEL ANALYSIS
Lundgren, B. and Möller, N., 2019. Defining Information Security. Science and engineering
ethics, 25(2), pp.419-441.
Mijnhardt, F., Baars, T. and Spruit, M., 2016. Organizational characteristics influencing SME
information security maturity. Journal of Computer Information Systems, 56(2), pp.106-115.
Moghaddasi, H., Sajjadi, S. and Kamkarhaghighi, M., 2016. Reasons in support of data security
and data security management as two independent concepts: a new model. The open medical
informatics journal, 10, p.4.
Namasudra, S., Devi, D., Choudhary, S., Patan, R. and Kallam, S., 2018. Security, privacy, trust,
and anonymity. Advances of DNA Computing in Cryptography, pp.138-150.
Puthal, D., Ranjan, R. and Chen, J., 2019. Big Data Stream Security Classification for IoT
Applications.
Puthal, D., Ranjan, R. and Chen, J., 2019. Big Data Stream Security Classification for IoT
Applications.
Qadir, S. and Quadri, S.M.K., 2016. Information availability: An insight into the most important
attribute of information security. Journal of Information Security, 7(03), p.185.
Rawat, D.B. and Bajracharya, C., 2015, April. Cyber security for smart grid systems: Status,
challenges and perspectives. In SoutheastCon 2015 (pp. 1-6). IEEE.
Reitz, F., 2019. Weaknesses and risks of the Consumer Internet of Things.
Riadi, I., Fadlil, A. and Fauzan, A., 2018. Evidence Gathering and Identification of LINE
Messenger on Android Device. Int. J. Comput. Sci. Inf. Secur.(IJCSIS), 16(5), pp.201-205.
Rjaibi, N. and Rabai, L.B.A., 2015. Developing a novel holistic taxonomy of security
requirements. Procedia Computer Science, 62, pp.213-220.
Sadiku, M.N., Alam, S. and Musa, S.M., 2017. Information assurance benefits and challenges:
An introduction. Information & Security, 36(1).
Shoufan, A. and Damiani, E., 2017. On inter-Rater reliability of information security
experts. Journal of information security and applications, 37, pp.101-111.
Lundgren, B. and Möller, N., 2019. Defining Information Security. Science and engineering
ethics, 25(2), pp.419-441.
Mijnhardt, F., Baars, T. and Spruit, M., 2016. Organizational characteristics influencing SME
information security maturity. Journal of Computer Information Systems, 56(2), pp.106-115.
Moghaddasi, H., Sajjadi, S. and Kamkarhaghighi, M., 2016. Reasons in support of data security
and data security management as two independent concepts: a new model. The open medical
informatics journal, 10, p.4.
Namasudra, S., Devi, D., Choudhary, S., Patan, R. and Kallam, S., 2018. Security, privacy, trust,
and anonymity. Advances of DNA Computing in Cryptography, pp.138-150.
Puthal, D., Ranjan, R. and Chen, J., 2019. Big Data Stream Security Classification for IoT
Applications.
Puthal, D., Ranjan, R. and Chen, J., 2019. Big Data Stream Security Classification for IoT
Applications.
Qadir, S. and Quadri, S.M.K., 2016. Information availability: An insight into the most important
attribute of information security. Journal of Information Security, 7(03), p.185.
Rawat, D.B. and Bajracharya, C., 2015, April. Cyber security for smart grid systems: Status,
challenges and perspectives. In SoutheastCon 2015 (pp. 1-6). IEEE.
Reitz, F., 2019. Weaknesses and risks of the Consumer Internet of Things.
Riadi, I., Fadlil, A. and Fauzan, A., 2018. Evidence Gathering and Identification of LINE
Messenger on Android Device. Int. J. Comput. Sci. Inf. Secur.(IJCSIS), 16(5), pp.201-205.
Rjaibi, N. and Rabai, L.B.A., 2015. Developing a novel holistic taxonomy of security
requirements. Procedia Computer Science, 62, pp.213-220.
Sadiku, M.N., Alam, S. and Musa, S.M., 2017. Information assurance benefits and challenges:
An introduction. Information & Security, 36(1).
Shoufan, A. and Damiani, E., 2017. On inter-Rater reliability of information security
experts. Journal of information security and applications, 37, pp.101-111.

11CIA MODEL ANALYSIS
Singh, K.P., Rishiwal, V. and Kumar, P., 2018, February. Classification of Data to Enhance Data
Security in Cloud Computing. In 2018 3rd International Conference On Internet of Things:
Smart Innovation and Usages (IoT-SIU) (pp. 1-5). IEEE.
Singh, K.P., Rishiwal, V. and Kumar, P., 2018, February. Classification of Data to Enhance Data
Security in Cloud Computing. In 2018 3rd International Conference On Internet of Things:
Smart Innovation and Usages (IoT-SIU) (pp. 1-5). IEEE.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




