Cybersecurity by Duane Wilson

Cybersecurity by Duane Wilson

Author:Duane Wilson [Wilson, Duane]
Language: eng
Format: epub
Tags: Cyber Security; Encoding; Information Warfare; Ciphers; Cyber Attacks; Confidentiality; Integrity; Availability; Authentication; Authorization; Non-Repudiation
Publisher: MIT Press
Published: 2021-08-24T00:00:00+00:00


Table 4 Cyber Vulnerabilities

Cyber tenet

Cyber threat

Cyber vulnerability example

Confidentiality

Information will not be kept secret

Attackers can expose data at rest, in transit, or in process using an injection or cross-site scripting attack to expose database records

Integrity

Information cannot be trusted

Attackers can manipulate data at rest, in transit, or in process using the fact that insufficient logging is done at the server

Availability

Information will not be available when it is needed

Attackers can block access to a web application by exploiting a publicly known security misconfiguration



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.