Methodology & Terminology 102, Attacker

Methodology & Terminology 102, Attacker

Recap and Intro If the CIA triad is the defender’s goal: confidentiality, Integrity, and availability plus non-repudiation then taking the antonym of all of those words and concepts gives us DAD-A. Better known as the DAD triangle, the attacker’s objectives are the following: disclosure, alteration, destruction, and anonymity. All four of these directly correlating to…

Methodology & Terminology 101, Defender

Methodology & Terminology 101, Defender

Introduction There’s three methodologies that cut to the core of cyber security, and they’ll come up time and time again. There’s the defenders goal, confidentiality, integrity, availability called the CIA triad, additionally non-repudiation. The attackers goals, disclosure, alteration, disruption, and impersonation the opposite of the CIA triad. Then there’s the thing we’re fighting over, data…