Methodology & Terminology 101, Defender

Methodology & Terminology 101, Defender

Introduction There’s three methodologies that cut to the core of cyber security, and they’ll come up time and time again. There’s the defenders goal, confidentiality, integrity, availability called the CIA triad, additionally non-repudiation. The attackers goals, disclosure, alteration, disruption, and impersonation the opposite of the CIA triad. Then there’s the thing we’re fighting over, data…