UPSI Digital Repository (UDRep)
Start | FAQ | About

QR Code Link :

Type :article
Subject :L Education (General)
Main Author :Chai, Kar Yee
Additional Authors :Mohamad Fadli Zolkipli
Title :Review on Confidentiality, Integrity and Availability in Information Security
Place of Production :Tanjong Malim
Publisher :Fakulti Seni, Komputeran dan Industri Kreatif
Year of Publication :2021
Corporate Name :Universiti Pendidikan Sultan Idris
PDF Full Text :Login required to access this item.

Abstract : Universiti Pendidikan Sultan Idris
Information security is very significant needs to be secured due to people relying on networks and communication. Therefore, protecting information is a major challenge with the number of users increases rapidly in recent years. The aim of this article is to review Confidentiality, Integrity and Availability (CIA) in information security. This article focuses on the issues of information security and the requirements of information security. The articles, journals and conference papers are reviewed by researchers were published in 2016-2021. Security issues are analyzed in the recent methodologies. The result of the relationship between CIA in each information security requirement is at a moderate level. It is suggested cybersecurity risk awareness program for society is needed. Therefore, every user could get full advantages in networks and digital platforms.

References

Al-Darwish, A. I., & Choe, P. (2019, July). A framework of information security integrated with human factors. In International Conference on Human-Computer Interaction (pp.217-229). Springer, Cham.

Alhassan, M. & Adjei-Quaye, A. (2017). Information Security in an Organization. International Journal of Computer (IJC). pp 100-116.

Alhosani, K. E., Khalid, S. K., Samsudin, N. A., Jamel, S., & Mohamad, K. M. (2019). A policy driven, human oriented information security model: A case study in UAE banking sector. IEEE Conference on Application, Information and Network Security (AINS). 

Alkhudhayr, F., Alfarraj, S., Aljameeli, B., & Elkhdiri, S.(2019, May). Information security: A review of information security issues and Techniques. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-6). IEEE. 

Aminzade, M. (2018). Confidentiality, integrity and availability–finding a balanced IT framework. Network Security, 2018(5), 9-11.

Awang, N., Samy, G. N., Hassan, N. H., Maarop, N., Magalingam, P., & Kamaruddin, N. (2020). Identification of information security threats using data mining approach in campus network. Journal of Physics: Conference Series, 1551(1), 012006 (11pp).

Cruz de la Cruz, J. E., Romero Goyzueta, C. A., & Cahuana, C. D. (2020). Open VProxy: Low Cost Squid Proxy Based Teleworking Environment with OpenVPN Encrypted Tunnels to Provide Confidentiality, Integrity and Availability. IEEE Engineering International Research Conference (EIRCON), Lima, Peru, pp. 1-4. https://doi.org/10.1109/EIRCON51178.2020.9253767 

Gao, T., Li, T., Jiang, R., Yang, M., & Zhu, R. (2019). Research on Cloud Service Security Measurement Based on Information Entropy. Int. J. Netw. Secur., 21, 1003-1013.

Horne, C. A., Maynard, S. B., & Ahmad, A. (2017). Organisational Information Security Strategy: Review, Discussion and Future Research. Australasian Journal of Information Systems, 21. https://doi.org/10.3127/ajis.v21i0.1427

Khidzir, N. Z., Daud, K. A. M., Ismail, A. R., Ghani, M. S. A. A., & Ibrahim, M. A. H. (2018). Information Security Requirement: The Relationship Between Cybersecurity Risk Confidentiality, Integrity and Availability in Digital Social Media. In Regional Conference on Science, Technology and Social Sciences (RCSTSS 2016) (pp. 229-237). Springer, Singapore.

Kumar, R., & Bhatia, M. P. S. (2020). A Systematic Review of the Security in Cloud Computing: Data Integrity, Confidentiality and Availability, IEEE International Conference on Computing, Power and Communication Technologies (GUCON), Greater Noida, India, pp. 334-337. https://doi.org/10.1109/GUCON48875.2020.9231255

Lundgren, B., & Möller, N. (2017). Defining Information Security. Science and Engineering Ethics, 25(2), 419–441.

Pardini, D. J., Heinisch, A. M. C., & Parreiras, F. S. (2017). Cyber security governance and management for smart grids in Brazilian energy utilities. JISTEM J.Inf.Syst. Technol. Manag. 14(3), 385-400. https://doi.org/10.4301/s180717752017000300006

Shoufan, A., & Damiani, E. (2017). On inter-rater reliability of information security experts. Journal of Information Security and Applications, 37, 101–111, 2017. Tchernykh, A., Schwiegelsohn, U., Talbi, E. G., & Babenko, M. (2019). Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. Journal of Computational Science, 36, 100581.

Thao, T. P., Miyaji, A., Rahman, M. S., Kiyomoto, S., & Kubota, A. (2017). Robust ORAM: Enhancing Availability, Confidentiality and Integrity. IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), Christchurch, New Zealand, 30-39. https://doi.org/10.1109/PRDC.2017.14

Treacy, C., & Mccaffery, F. (2017). Data Security Overview for Medical Mobile Apps Assuring the Confidentiality, Integrity and Availability of Data in Transmission. International Journal on Advances in Security. 9(3&4), 146-157. Tsaregorodtsev, A. V., Kravets, O. J., Choporov, O. N., & Zelenina, A. N. (2018). Information security risk estimation for cloud infrastructure. International Journal on Information Technologies & Security,10(4).

Wang, Y., Yao, J., & Yu, X. (2018). Information Security Protection in Software Testing, 2018 14th International Conference on Computational Intelligence and Security (CIS), Hangzhou, China, pp. 449-452. 

https://doi.org/10.1109/CIS2018.2018.00106

Yu, J. -Y., Kim, Y., & Kim, Y. -G. (2021). Intelligent Video Data Security: A Survey and Open Challenges. IEEE Access, 9, 26948-26967. https://doi.org/10.1109/ACCESS.2021.3057605


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries with this repository, kindly contact us at pustakasys@upsi.edu.my or Whatsapp +60163630263 (Office hours only)