Attacks on the confidentiality, integrity, and availability of cloud data
So, we’ve looked at the difference between internal cyberattacks and external cyberattacks, and some of the different entry point attack vectors they can use. There’s another way for you to categorize the cyberattacks you’ll be simulating as a pentester.
We must look at the CIA (confidentiality, integrity, and availability) Triad of cybersecurity. It’s one of the most important concepts in our area of study.
All cyberattacks impact one, two, or all three components of the CIA Triad:
- Confidentiality is all about making sure that your organization’s data is only readable to the entities that are allowed to access it. A data breach is an example of a type of cyberattack that impacts confidentiality.
- Integrity is all about making sure that only authorized entities can alter or modify your organization’s data. If a cyber attacker replaces a legitimate component...