Review on Confidentiality, Integrity and Availability in Information Security
Information security is very significant needs to be secured due to people relying on networks and communication. Therefore, protecting information is a major challenge with the number of users increases rapidly in recent years. The aim of this article is to review Confidentiality, Integrity and Availability (CIA) in information security. This article focuses on the issues of information security and the requirements of information security. The articles, journals and conference papers are reviewed by researchers were published in 2016-2021. Security issues are analyzed in the recent methodologies. The result of the relationship between CIA in each information security requirement is at a moderate level. It is suggested cybersecurity risk awareness program for society is needed. Therefore, every user could get full advantages in networks and digital platforms.
Al-Darwish, A. I., & Choe, P. (2019, July). A framework of information security integrated with human factors. In International Conference on Human-Computer Interaction (pp. 217-229). Springer, Cham.
Alhassan, M. & Adjei-Quaye, A. (2017). Information Security in an Organization. International Journal of Computer (IJC). pp 100-116.
Alhosani, K. E., Khalid, S. K., Samsudin, N. A., Jamel, S., & Mohamad, K. M. (2019). A policy driven, human oriented information security model: A case study in UAE banking sector. IEEE Conference on Application, Information and Network Security (AINS).
Alkhudhayr, F., Alfarraj, S., Aljameeli, B., & Elkhdiri, S. (2019, May). Information security: A review of information security issues and Techniques. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-6). IEEE.
Aminzade, M. (2018). Confidentiality, integrity and availability–finding a balanced IT framework. Network Security, 2018(5), 9-11.
Awang, N., Samy, G. N., Hassan, N. H., Maarop, N., Magalingam, P., & Kamaruddin, N. (2020). Identification of information security threats using data mining approach in campus network. Journal of Physics: Conference Series, 1551(1), 012006 (11pp).
Cruz de la Cruz, J. E., Romero Goyzueta, C. A., & Cahuana, C. D. (2020). Open VProxy: Low Cost Squid Proxy Based Teleworking Environment with OpenVPN Encrypted Tunnels to Provide Confidentiality, Integrity and Availability. IEEE Engineering International Research Conference (EIRCON), Lima, Peru, pp. 1-4. https://doi.org/10.1109/EIRCON51178.2020.9253767
Gao, T., Li, T., Jiang, R., Yang, M., & Zhu, R. (2019). Research on Cloud Service Security Measurement Based on Information Entropy. Int. J. Netw. Secur., 21, 1003-1013.
Horne, C. A., Maynard, S. B., & Ahmad, A. (2017). Organisational Information Security Strategy: Review, Discussion and Future Research. Australasian Journal of Information Systems, 21. https://doi.org/10.3127/ajis.v21i0.1427
Khidzir, N. Z., Daud, K. A. M., Ismail, A. R., Ghani, M. S. A. A., & Ibrahim, M. A. H. (2018). Information Security Requirement: The Relationship Between Cybersecurity Risk Confidentiality, Integrity and Availability in Digital Social Media. In Regional Conference on Science, Technology and Social Sciences (RCSTSS 2016) (pp. 229-237). Springer, Singapore.
Kumar, R., & Bhatia, M. P. S. (2020). A Systematic Review of the Security in Cloud Computing: Data Integrity, Confidentiality and Availability, IEEE International Conference on Computing, Power and Communication Technologies (GUCON), Greater Noida, India, pp. 334-337. https://doi.org/10.1109/GUCON48875.2020.9231255
Lundgren, B., & Möller, N. (2017). Defining Information Security. Science and Engineering Ethics, 25(2), 419–441.
Pardini, D. J., Heinisch, A. M. C., & Parreiras, F. S. (2017). Cyber security governance and management for smart grids in Brazilian energy utilities. JISTEM J.Inf.Syst. Technol. Manag. 14(3), 385-400. https://doi.org/10.4301/s1807-17752017000300006
Shoufan, A., & Damiani, E. (2017). On inter-rater reliability of information security experts. Journal of Information Security and Applications, 37, 101–111, 2017.
Tchernykh, A., Schwiegelsohn, U., Talbi, E. G., & Babenko, M. (2019). Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. Journal of Computational Science, 36, 100581.
Thao, T. P., Miyaji, A., Rahman, M. S., Kiyomoto, S., & Kubota, A. (2017). Robust ORAM: Enhancing Availability, Confidentiality and Integrity. IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), Christchurch, New Zealand, 30-39. https://doi.org/10.1109/PRDC.2017.14
Treacy, C., & Mccaffery, F. (2017). Data Security Overview for Medical Mobile Apps Assuring the Confidentiality, Integrity and Availability of Data in Transmission. International Journal on Advances in Security. 9(3&4), 146-157.
Tsaregorodtsev, A. V., Kravets, O. J., Choporov, O. N., & Zelenina, A. N. (2018). Information security risk estimation for cloud infrastructure. International Journal on Information Technologies & Security, 10(4).
Wang, Y., Yao, J., & Yu, X. (2018). Information Security Protection in Software Testing, 2018 14th International Conference on Computational Intelligence and Security (CIS), Hangzhou, China, pp. 449-452. https://doi.org/10.1109/CIS2018.2018.00106
Yu, J. -Y., Kim, Y., & Kim, Y. -G. (2021). Intelligent Video Data Security: A Survey and Open Challenges. IEEE Access, 9, 26948-26967. https://doi.org/10.1109/ACCESS.2021.3057605
Copyright (c) 2021 UPSI Press
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.