Actions

Basic Concepts: Difference between revisions

From Jedisaber Wiki

No edit summary
No edit summary
Line 34: Line 34:
- Denial: disruption of an authorized user's legitimate access to information; violation of the principle of availability
- Denial: disruption of an authorized user's legitimate access to information; violation of the principle of availability
(DDoS, failure of a server)
(DDoS, failure of a server)
=== Practical Application ===
You can use the CIA and DAD models as a starting point for a more detailed risk analysis.
Security incidents occur when there is a breach of the confidentiality, integrity, and/or availability of information or systems.
CIA and DAD triads can be a useful staring point.
For example, in assessing threats to your website, you can apply the DAD triad:
- '''Disclosure:''' Does the site contain sensitive information that would damage the company if it was disclosed at an attacker?
- '''Alteration:''' If an attacker was able to modify information contained on the site, would that cause financial, reputational, or operational damage?
- '''Denial:''' Does the website perform mission-critical activities that could damage the business significantly if an attacker were able to disrupt the site?
=== Impacts of a breech ===
A security incident can have several types of risk.
Types of risk:
- '''Financial Risk'''
Monetary damage. Equipment and/or facilities may have to be repairs or replaced.
Indirectly, plans or information may be lost that may cost money to re-create (or information could go to a competitor that
- Reputational Risk
- Strategic Risk
- Operational Risk
- Compliance Risk

Revision as of 19:13, 6 June 2025

CIA Triad

The three key objectives (CIA Triad) of cybersecurity programs are confidentiality, integrity, and availability.

- Confidentiality: Unauthorized users don't gain access. (Firewalls, ACL's, encryption)

- Integrity: No unauthorized modifications. (Hashing, monitoring)

- Availability: The system is up when users need it. (fault tolerance, clustering, backups)

Nonrepudiation: Someone who performed an action can't deny performing said action (Digital Signatures) (Not a part of CIA, but also important.)


DAD Triad

The the three key threats to cybersecurity efforts: disclosure, alteration, and denial.

- Disclosure: exposure of sensitive information to unauthorized individuals; violation of the principle of confidentiality (Attacks on the system, misconfigured credentials, lost devices)

- Alteration: unauthorized modification of information; violation of the principle of integrity (fraudulent transactions, typos, bit flip due to power loss)

- Denial: disruption of an authorized user's legitimate access to information; violation of the principle of availability (DDoS, failure of a server)


Practical Application

You can use the CIA and DAD models as a starting point for a more detailed risk analysis.

Security incidents occur when there is a breach of the confidentiality, integrity, and/or availability of information or systems.

CIA and DAD triads can be a useful staring point.

For example, in assessing threats to your website, you can apply the DAD triad:

- Disclosure: Does the site contain sensitive information that would damage the company if it was disclosed at an attacker?

- Alteration: If an attacker was able to modify information contained on the site, would that cause financial, reputational, or operational damage?

- Denial: Does the website perform mission-critical activities that could damage the business significantly if an attacker were able to disrupt the site?


Impacts of a breech

A security incident can have several types of risk.

Types of risk:

- Financial Risk

Monetary damage. Equipment and/or facilities may have to be repairs or replaced. Indirectly, plans or information may be lost that may cost money to re-create (or information could go to a competitor that

- Reputational Risk

- Strategic Risk

- Operational Risk

- Compliance Risk