CIA Triad Attacks
List Activity – CIA Triad Attacks
No unread replies.
No replies.
As you will learn early on in the quarter, the CIA Triad is a very important framework to learn and understand what each facet means to the security posture of an organization. The objective of this list activity is for you to be able to tell the difference between an attack on confidentiality, integrity, and availability. You are going to use the internet to find different attacks.
List Guidelines:
Go out to the Internet and find 3 different attacks that affect the availability, confidentiality, and integrity of data and/or data networks. Sometimes they overlap so you can associate 2 or more of the legs of the triad to a single attack (you still need to find 3 different attacks though!)
Write down the specific name of the attack (if there is one) and any details surrounding the attack — time, the attackers, who they were attacking, motive, etc
Write down which part(s) of the CIA triad it affected.
Responses:
In order to get full points, you need to respond to at least 2 other students in the class. Make sure your response is more than just, “I agree.” It needs to be more profound than that!
Resources:
Definition of the CIA Triad: https://resources.infosecinstitute.com/cia-triad/#gref
(Links to an external site.)
Textbook: Cybersecurity and Cyberwar & Cybersecurity for Beginners
Recent Comments