Skip to main content

Table 2 Failure modes as related to the CIA triad

From: Strengthening information technology security through the failure modes and effects analysis approach

Security processes

Failure modes

Confidentiality

Availability

Integrity

Antivirus update

  

x

Firewall

 

x

 

Password protection

x

  

Performance and tuning

  

x

Access control list

x

x

 

Internet use policy

x

 

x

External users

x

 

x

Internal users

x

 

x

IT professionals

  

x

CCTV

x

  

Biometric

x

  

Electronic ID cards

x

  

Terminal

 

x

 

Aircraft

  

x

Wireless access

 

x

x

Internal operations

  

x

Hardware

x

x

x

Software

x

x

x

Data

x

x

x