One (defender-centric) conventional definition of the security challenge is to maintain the confidentiality, integrity, and availability of data (and services). Another approach is to think about interruption, interception, alteration, and fabrication from the attacker's perspective.
What are the connections between the final four notions and the first three? Is there a match between any of the four and any of the three? Is one or more of the four encompassing one of the three? Is there anything that falls within the scope of one formulation but not the other?
Which framework is more beneficial, and why?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here