Model's Name Features |
CIA Triad Model | Parkerian Hexad Model | Five Pillar Information Assurance | 7ISO principles | Traditional 4-Steps | Pentagon of Trust | Evolutionary Circles of Information Security |
Confidentiality | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
Integrity | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
Availability | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
Authenticity | ■ | ■ | ■ | ■ | ■ | ||
Admissibility | ■ | ||||||
Non-Repudiation | ■ | ■ | ■ | ||||
Authentication | ■ | ||||||
Possession | ■ | ■ | |||||
Utility | ■ | ■ | |||||
Reliability | ■ | ■ | |||||
Accountability | ■ | ■ | |||||
Transparency | ■ | ||||||
Auditability | ■ | ||||||
Privacy | ■ | ||||||
Efficiency | ■ | ||||||
Cost-effectiveness | ■ |