Module
Module
student record stored in the Document Management System that is based from the C.I.A Triad
Practices or the Confidentiality, Integrity, and Availability and also has the principles and
characteristics of NIST Cyber Security Framework, ISO/IEC 27001, and the Theory of Planned
Behavior.
CINT Framework is enhanced security framework based from the combination of the
C.I.A. Triad, ISO/IEC 27001 standard, NIST Security Framework, and the Theory of Planned
Behavior.
C.I.A Triad
The C.I.A Triad is a security model that has three core principles which are the following:
• Integrity: Ensuring the accuracy and completeness of information and verifies the
authenticity of documents.
• Availability: Ensuring the document or stored information can be accessed and reliable.
This model provides a framework for understanding and addressing security risks.
ISO/IEC 27001 Standard
enhanced security posture, reduced risk of data breaches, and improved operational efficiency.
Some of the key components of the ISO/IEC 27001 standard are the following:
These policies encompass a wide array of aspects, including access control, data
classification, incident response, and more. They provide a clear roadmap for ensuring
that all employees understand their roles and responsibilities in maintaining information
security.
Risk Treatment Plan: It outlines a specific measure to address and manage a risk. This
involves selecting appropriate security controls, which may range from technological
solutions to procedural changes, to ensure that potential threats are adequately mitigated.
National Institute of Standards and Technology (NIST) to manage cybersecurity risk. It provides
Identify: Identify assets, business processes, and dependencies. Also assess risks and threats and
Protect: Develop and implement security policies and procedures. It also protects system and
information integrity that limits and controls access to systems and information.
Detect: Implement continuous monitoring and detection processes and detect and analyze security
Respond: Develop and implement an incident response plan. This mitigates security incidents and
practices.
The Theory of Planned Behavior (TPB) is a psychological theory that explains human behavior
in terms of intentions and attitudes. It suggests that people's intentions to perform a specific
behavior are influenced by three main factors: Attitude, Subjective Norm, and Perceived
Behavioral Control.
unique passwords.
patches promptly.
emails.
information.
UNDERSTANDING CINT FRAMEWORK
This module outlines a comprehensive security framework for IoT systems, drawing on the
principles of the CIA Triad, ISO/IEC 27001, NIST Cybersecurity Framework, and the Theory of
Planned Behavior. The framework aims to protect the confidentiality, integrity, and availability of
Key Components
• Identify Assets: Catalog all IoT devices, systems, and data, including their criticality and
sensitivity.
• Threat Modeling: Identify potential threats, such as cyberattacks, physical damage, and
unauthorized access.
• Risk Prioritization: Prioritize risks based on their likelihood and potential impact.
Security Controls
• Confidentiality:
o Encryption: Employ strong encryption algorithms to protect data at rest and in
transit.
personnel.
authentication.
• Integrity:
o Data Validation: Implement data validation and integrity checks to ensure data
accuracy.
address vulnerabilities.
• Availability:
downtime.
• Device Security:
o Secure Boot: Ensure that devices boot securely and only execute authorized code.
• Network Security:
breaches.
unauthorized access.
o Privacy by Design: Incorporate privacy principles into the design and development
of IoT systems.
• Social Engineering Awareness: Educate users about social engineering tactics and how
to avoid them.
• Strong Password Practices: Enforce strong password policies and promote the use of
password managers.
Implementation Guidelines
1. Risk Assessment and Management: Conduct regular risk assessments and update
2. Security Policy and Procedures: Develop and enforce comprehensive security policies
and procedures.
3. Monitoring and Logging: Implement robust monitoring and logging systems to detect
4. Incident Response Plan: Develop and test an incident response plan to minimize the
5. Continuous Improvement: Regularly review and update the security framework to adapt