Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
43
provided IoCs to search for potential breaches, review and validate authentication activity for all
remote access, and investigate other anomalous activity. More information
about the technical
details of the attack has been published by
CrowdStrike
.
62
. Put simply, integrity is important for an
enterprise to protect because other businesses and consumers need to be able to trust the
information held by the enterprise.
3.3.3
Availability
A system is considered
Available
if the people who are supposed to access it can do so. Imagine
an attacker has gained access to a social media account and also posted some content of their
choosing. So far, this would constitute an attack against confidentiality and integrity. If the
attacker changes the user’s password and
prevents them from logging on, this would also
become an attack against availability. A common attack against availability is
Yüklə
Dostları ilə paylaş: