Table 1: Characteristics of data security models.

Model's Name
Features
CIA Triad Model Parkerian Hexad Model Five Pillar Information Assurance 7ISO principles Traditional 4-Steps Pentagon of Trust Evolutionary Circles of Information Security
Confidentiality
Integrity
Availability
Authenticity
Admissibility
Non-Repudiation
Authentication
Possession
Utility
Reliability
Accountability
Transparency
Auditability
Privacy
Efficiency
Cost-effectiveness