Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, interception, modification, and fabrication. How do the first three concepts relate to the last four? That is, is any of the four equivalent to one or more of the three? Is one of the three encompassed by one or more of the four?

What will be an ideal response?


There
is
not
a
good
one-­?to-­?one
correspondence.
Modification
is
primarily
a
failure
of
integrity,
although
there
are
aspects
of
availability
(denial
of
service).
Fabrication
is
probably
the
closest
to
being
exclusively
an
integrity
violation,
although
fabrication
of
covert
outputs
could
be
used
to
leak
otherwise
confidential
data.
Interruption
is
an
availability
concern,
although
one
can
argue
that
it
is
also
a
failure
of
the
integrity
of
a
communication
or
information
flow.
Interception
primarily
results
in
a
breach
of
confidentiality,
although
it
could
also
be
seen
as
an
attack
on
availability.
The
distinctions
drawn
here
are
primarily
semantic.
There
are
also
possible
arguments
over
whether
an
incident
is
a
lack
of
confidentiality
or
integrity,
too.
The
point
is
not
to
split
hairs
of
categorization
among
the
three
or
four
terms
but
rather
to
use
the
terms
to
envision
a
broad
range
of
vulnerabilities
and
threats.

Computer Science & Information Technology

You might also like to view...

Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:

A. computer forensics B. penetration testing C. vulnerability testing D. risk management

Computer Science & Information Technology

Item E in the accompanying figure is used to set the _______________ of the audio player plugin.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is a photosensitive drum?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is not a primary use of the Scenario Manager?

A. Find a scenario-style solution to a complex problem by changing a single variable B. Create different scenarios with multiple sets of changing cells C. Build summary worksheets that contain the different scenarios D. View the results of each scenario on a worksheet

Computer Science & Information Technology