Cybersecurity by Duane Wilson
Author:Duane Wilson [Wilson, Duane]
Language: eng
Format: epub
Tags: Cyber Security; Encoding; Information Warfare; Ciphers; Cyber Attacks; Confidentiality; Integrity; Availability; Authentication; Authorization; Non-Repudiation
Publisher: MIT Press
Published: 2021-08-24T00:00:00+00:00
Table 4 Cyber Vulnerabilities
Cyber tenet
Cyber threat
Cyber vulnerability example
Confidentiality
Information will not be kept secret
Attackers can expose data at rest, in transit, or in process using an injection or cross-site scripting attack to expose database records
Integrity
Information cannot be trusted
Attackers can manipulate data at rest, in transit, or in process using the fact that insufficient logging is done at the server
Availability
Information will not be available when it is needed
Attackers can block access to a web application by exploiting a publicly known security misconfiguration
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7537)
Robo-Advisor with Python by Aki Ranin(7415)
Offensive Shellcode from Scratch by Rishalin Pillay(6002)
Ego Is the Enemy by Ryan Holiday(4915)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(4814)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4426)
Python for ArcGIS Pro by Silas Toms Bill Parker(4075)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3781)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3499)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3270)
Speed Up Your Python with Rust by Maxwell Flitton(3223)
Liar's Poker by Michael Lewis(3200)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3185)
Extreme DAX by Michiel Rozema & Henk Vlootman(3160)
Agile Security Operations by Hinne Hettema(3111)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3103)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3075)
Cryptography Algorithms by Massimo Bertaccini(2994)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2973)
