Confidentiality, Integrity, and Availability in Network Systems: A Review of Related Literature


Authors : Osaro Mitchell Christopher Osazuwa

Volume/Issue : Volume 8 - 2023, Issue 12 - December

Google Scholar : http://tinyurl.com/2hshsfn7

Scribd : http://tinyurl.com/4c43nspe

DOI : https://doi.org/10.5281/zenodo.10464076

Abstract : This paper delves into the intricate tapestry of information security in network systems, scrutinizing the quintessential "CIA triad" – confidentiality, integrity, and availability – through the lens of contemporary challenges and solutions. We embark on a comprehensive journey across diverse technical landscapes, traversing the burgeoning Internet of Things (IoT), the enigmatic realm of blockchain technology, and the dynamic frontiers of Software-Defined Networks (SDNs). As we navigate these disparate terrains, the paramount importance of the CIA triad as a cornerstone of information security becomes increasingly apparent. Yet, we acknowledge the inherent fluidity of the security landscape, necessitating a critical reappraisal and potential expansion of the traditional CIA framework. This review underscores the interdisciplinary nature of security concerns, dismantling the artificial silos between technical prowess, policy formulation, and ethical considerations. We advocate for a collaborative and multifaceted approach where engineers, policymakers, and ethicists join to weave a robust security tapestry. By embracing this holistic perspective, we can effectively confront the multifaceted challenges posed by malicious actors and evolving threats within the digital domain. The paper culminates in a set of forward-looking recommendations for future research endeavours. We call for seamlessly integrating emerging technologies, such as artificial intelligence and quantum computing, into the security paradigm. We champion a holistic approach to security that transcends technical solutions and encompasses broader societal and ethical dimensions. We advocate for cross-disciplinary collaborations that bridge the gap between academia and industry, translating theoretical advancements into practical solutions. Finally, we emphasize the need for continuous adaptation and real-time threat intelligence, ensuring our defenses remain agile despite ever-evolving adversaries. In conclusion, this paper serves as a springboard for further exploration of the CIA triad in the context of contemporary network systems. By acknowledging its limitations, embracing interdisciplinarity, and constantly adapting to the evolving threat landscape, we can build a more secure and resilient digital future for all.

Keywords : Confidentiality, Integrity, Availability, Network Systems and Information Security.

This paper delves into the intricate tapestry of information security in network systems, scrutinizing the quintessential "CIA triad" – confidentiality, integrity, and availability – through the lens of contemporary challenges and solutions. We embark on a comprehensive journey across diverse technical landscapes, traversing the burgeoning Internet of Things (IoT), the enigmatic realm of blockchain technology, and the dynamic frontiers of Software-Defined Networks (SDNs). As we navigate these disparate terrains, the paramount importance of the CIA triad as a cornerstone of information security becomes increasingly apparent. Yet, we acknowledge the inherent fluidity of the security landscape, necessitating a critical reappraisal and potential expansion of the traditional CIA framework. This review underscores the interdisciplinary nature of security concerns, dismantling the artificial silos between technical prowess, policy formulation, and ethical considerations. We advocate for a collaborative and multifaceted approach where engineers, policymakers, and ethicists join to weave a robust security tapestry. By embracing this holistic perspective, we can effectively confront the multifaceted challenges posed by malicious actors and evolving threats within the digital domain. The paper culminates in a set of forward-looking recommendations for future research endeavours. We call for seamlessly integrating emerging technologies, such as artificial intelligence and quantum computing, into the security paradigm. We champion a holistic approach to security that transcends technical solutions and encompasses broader societal and ethical dimensions. We advocate for cross-disciplinary collaborations that bridge the gap between academia and industry, translating theoretical advancements into practical solutions. Finally, we emphasize the need for continuous adaptation and real-time threat intelligence, ensuring our defenses remain agile despite ever-evolving adversaries. In conclusion, this paper serves as a springboard for further exploration of the CIA triad in the context of contemporary network systems. By acknowledging its limitations, embracing interdisciplinarity, and constantly adapting to the evolving threat landscape, we can build a more secure and resilient digital future for all.

Keywords : Confidentiality, Integrity, Availability, Network Systems and Information Security.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe